CyberSecurity Brief - MAR19

-


Hackers Stole $19 Million From Bithumb Cryptocurrency Exchange
Hackers yesterday stole nearly $19 million worth of cryptocurrency from Bithumb, the South Korea-based popular cryptocurrency exchange admitted today. According to Primitive Ventures' Dovey Wan, who first broke the information on social media, hackers managed to compromise a number of Bithumb's hot EOS and XRP wallets and transferred around 3 million...

Unpatched Zero-Days in Microsoft Edge and IE Browsers Disclosed Publicly
A security researcher today publicly disclosed details and proof-of-concept exploits for two 'unpatched' zero-day vulnerabilities in Microsoft's web browsers after the company allegedly failed to respond to his responsible private disclosure. Both unpatched vulnerabilities—one of which affects the latest version of Microsoft Internet Explorer and...

Undocumented Intel VISA Tech Can Be Abused, Researchers Allege
Researchers at Black Hat Asia said that Intel VISA, an undocumented testing tool, can be abused using previously-disclosed vulnerabilities.

Critical Bug in Cisco WebEx Browser Extensions Allows Remote Code-Execution
Users of the conferencing platform should update immediately.

Awakening the beast: BatMobi adware
On February 12, a patron of the Malwarebytes Forum alerted us of an issue with ad redirects that seemed to come out of nowhere. An outcry from other commenters filled the forum thread, all experiencing the same redirects to the same exact websites. Our web protection team traced the offending websites back to the culprit—the adware known as BatMobi....

CVE-2019-9695
Norton Core prior to v278 may be susceptible to an arbitrary code execution issue, which is a type of vulnerability that has the potential of allowing an individual to execute arbitrary commands or code on a target machine or in a target process. Note that this exploit is only possible with direct physical access to the device.

An in-depth analysis of Magecart skimming scripts

Emotet-Distributed Ransomware Loader for Nozelesn Found via Managed Detection and Response
By Erika Mendoza, Jay Yaneza, Gilbert Sison, Anjali Patil, Julie Cabuhat, and Joelson Soares Through our managed detection and response (MDR) monitoring, we discovered the modular Emotet malware distributing the Nymaim malware, which then loads the Nozelesn ransomware. We detected this particular Emotet variant in one of our monitored endpoints in...

Commando VM: The First of Its Kind Windows Offensive Distribution
For penetration testers looking for a stable and supported Linux testing platform, the industry agrees that Kali is the go-to platform. However, if you’d prefer to use Windows as an operating system, you may have noticed that a worthy platform didn’t exist. As security researchers, every one of us has probably spent hours customizing...

Microsoft Takes Down 99 Hacker-Controlled Websites

How Microsoft found a Huawei driver that opened systems to attack
Enlarge (credit: Valentina Palladino) Huawei MateBook systems that are running the company's PCManager software included a driver that would let unprivileged users create processes with superuser privileges. The insecure driver was discovered by Microsoft using some of the new monitoring features added to Windows version 1809 that are monitored...

WinRAR Zero-day Abused in Multiple Campaigns
WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20250 by Check Point Research, enables attackers to specify arbitrary destinations during...

DragonEx exchange hacked, smoking ashes being raked over
“Part” of its assets have been retrieved, and they've got an address for a suddenly much plumper Bittrex wallet.

CVE-2019-7608
Kibana versions before 5.6.15 and 6.6.1 had a cross-site scripting (XSS) vulnerability that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.

CVE-2019-10044
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font...

Latest iOS 12.2 Update Patches Some Serious Security Vulnerabilities
Apple on Monday released iOS 12.2 to patch a total of 51 security vulnerabilities in its mobile operating system that affects iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. A majority of vulnerabilities Apple patched this month reside in its web rendering engine WebKit, which is used by many apps and web browsers running...

Spyware sneaks into 'million-ish' Asus PCs via poisoned software updates, says Kaspersky
Hackers were interested in 600 or so targets, it is claimed A million or so Asus personal computers may have downloaded spyware from the computer maker's update servers and installed it, Kaspersky Lab claims.…

Interception: Digging into BokBot's Man-in-the-Browser

Microsoft Announces Windows Defender ATP Antivirus for Mac
Brace yourself guys. Microsoft is going to release its Windows Defender ATP antivirus software for Mac computers. Sounds crazy, right? But it's true. Microsoft Thursday announced that the company is bringing its anti-malware software to Apple’s macOS operating system as well—and to more platforms soon, like Linux. As a result, the...

Google researcher discovers new type of Windows security weakness
Microsoft will patch a new Windows security bug discovered by Google Project Zero - despite finding no evidence that it poses a threat.

Russian Internet Segment Architecture

Fin7 Ramps Up Campaigns With Two Fresh Malware Samples
Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel.

The Norsk Hydro ransomware attack: An in-depth look
CarbonCopy: A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion

New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep
Cybersecurity researchers today disclosed details of two newly identified Magecart attacks targeting online shoppers of bedding retailers MyPillow and Amerisleep. Magecart is an umbrella term researchers gave to at least 11 different hacking groups that are specialized in implanting malware code on e-commerce websites with an intent to steal payment...

How malvertiser "VeryMal" abused Firebase to conceal and smuggle their payload.

Android Q — Google Adds New Mobile Security and Privacy Features
Google has recently released the first beta version of Android Q, the next upcoming version of Google's popular mobile operating system, with a lot of new privacy improvements and other security enhancements. Android Q, where Q has not yet been named, offers more control over installed apps, their access, and permissions, and location settings;...

Cardinal RAT Resurrected to Target FinTech Firms
A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.

PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws
The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity security vulnerabilities. PuTTY is one of the most popular and widely used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols. Almost..

G Suite admins can now disallow SMS and voice authentication
Users of G Suite may find that the option to authenticate themselves via SMS or voice call has suddenly disappeared.

Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices
Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded devices intended for use within business environments in an attempt to gain control over larger bandwidth to carry out devastating DDoS attacks. Although the original creators of Mirai botnet have already been arrested...

CAs Reissue Over One Million Weak Certificates
Turns out that the software a bunch of CAs used to generate public-key certificates was flawed: they created random serial numbers with only 63 bits instead of the required 64. That may not seem like a big deal to the layman, but that one bit change means that the serial numbers only have half the required entropy. This really isn't a security problem;...

GlitchPOS Malware Peddled to Steal Credit Card Numbers
A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.

DARPA Is Developing an Open-Source Voting System
This sounds like a good development: ...a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking. The first-of-its-kind system will be designed by an Oregon-based firm called Galois, a longtime government...

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection
An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.

Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web
A hacker who was selling details of nearly 890 million online accounts stolen from 32 popular websites in three separate rounds has now put up a fourth batch of millions of records originating from 6 other sites for sale on the dark web. The Hacker News today received a new email from the Pakistani hacker, who goes by online alias Gnosticplayers...

UK code breakers drop Bombe, Enigma and Typex simulators onto the web for all to try
You have to run GCHQ code? Nice try, spy guys UK signals intelligence agency GCHQ, celebrating its centenary, has released emulators for famed World War II-era cipher machines that can be run within its web-based educational encryption app CyberChef.…

Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw
Newly patched CVE-2019-0797 is being actively exploited by two APTs, FruityArmor and SandCat.

Intel Windows 10 Graphics Drivers Riddled With Flaws
Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code execution.

Zero-Day Flaws in Counter-Strike 1.6 Let Malicious Servers Hack Gamers' PCs
If you are a Counter-Strike gamer, then beware, because 39% of all existing Counter-Strike 1.6 game servers available online are malicious that have been set-up to remotely hack gamers' computers. A team of cybersecurity researchers at Dr. Web has disclosed that an attacker has been using malicious gaming servers to silently compromise computers...

New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites
If for some reason your WordPress-based website has not yet been automatically updated to the latest version 5.1.1, it's highly recommended to immediately upgrade it before hackers could take advantage of a newly disclosed vulnerability to hack your website. Simon Scannell, a researcher at RIPS Technologies GmbH, who previously reported multiple...

Facebook suffer most severe outage ever
Facebook owned Instagram and WhatsApp also affected by unexplained interruption The post Facebook suffer most severe outage ever.

Firefox Send — Free Encrypted File Transfer Service Now Available For All
Mozilla has made it easy for you to share large files securely and privately with whomever you want, eliminating the need to depend upon less secure free third-party services or file upload tools that burn a hole in your pocket. Mozilla has finally launched its free, end-to-end encrypted file-transfer service, called Firefox Send, to the public,...

Severe Flaw Disclosed In StackStorm DevOps Automation Software
A security researcher has discovered a severe vulnerability in the popular, open source event-driven platform StackStorm that could allow remote attackers to trick developers into unknowingly execute arbitrary commands on targeted services. StackStorm, aka "IFTTT for Ops," is a powerful event-driven automation tool for integration and automation...

Georgia's Jackson County Pays $400K to Ransomware Attackers
The ransomware campaign started March 1 and shut down most of Jackson County's IT systems.

Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data
Popular enterprise software company Citrix that provides services to the U.S. military, the FBI, many U.S. corporations, and various U.S. government agencies disclosed last weekend a massive data breach of its internal network by "international cyber criminals." Citrix said it was warned by the FBI on Wednesday of foreign hackers compromising its...

New SLUB Backdoor Uses GitHub, Communicates via Slack
by Cedric Pernet, Daniel Lunghi, Jaromir Horejsi, and Joseph C. Chen We recently came across a previously unknown malware that piqued our interest in multiple ways. For starters, we discovered it being spread via watering hole attacks, a technique that involves an attacker compromising a website before adding code to it so visitors are redirected...

Google reveals BuggyCow macOS security flaw
Google’s Project Zero researchers have revealed a "high severity" macOS security flaw nicknamed ‘BuggyCow’ which Apple appears to be in no rush to patch.

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool
The United States' National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency’s home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications. GHIDRA is a Java-based reverse engineering framework...

Fileless Banking Trojan Targeting Brazilian Banks Downloads Possible Botnet Capability, Info Stealers
By Henry Alarcon, Jr. and Raphael Centeno We analyzed a fileless malware with multiple .BAT attachments and a batch file from IoCs reported by researchers online that was capable of opening an IP address, downloading a PowerShell with a banking trojan payload, and installing a hack tool and an information stealer. Looking further, we observed it stealing...

Google Launches Backstory — A New Cyber Security Tool for Businesses
Google's one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats. Network infrastructures at most enterprises...