Cybersecurity brief - APR14

-


'MuddyWater' APT Spotted Attacking Android

Credential-stuffing attacks behind 30 billion login attempts in 2018

Senate Bill Would Ban Social Networks' Social Engineering Tricks

FireEye Mandiant incident responders reveal a new attack by the hacking group that previously targeted a petrochemical plant in Saudi Arabia in 2017.
Microsoft Internet Explorer v11 XML External Entity Injection 0day

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

VSDC Video Editing Software Website Hacked to Spread Banking Trojan

Someone at Amazon has been listening to you via Alexa

Escaping the Chrome Sandbox

New BGP attack in the wild

Telemetry interface exposed Juniper's hardcoded password

'Dragonblood' Vulnerabilities Seep Into WPA3 Secure Wifi Handshake

$177.5 M Settlement Proposal: The Second Possible Big Dent In Yahoo’s Treasury For 2013-16 Data Breach Incident

Flickr tackling online image theft with new AI service

New Version of Flame Malware Discovered
Flame was discovered in 2012, linked to Stuxnet, and believed to be American in origin. It has recently been linked to more modern malware through new analysis tools that find linkages between different software.
Seems that Flame did not disappear after it was discovered, as was previously thought. (Its controllers used a kill switch to disable and erase it.) It was rewritten and reintroduced.
Note that the article claims that Flame was believed to be Israeli in origin. That's wrong; most people who have an opinion believe it is from the NSA.

Hackers crack university defenses in just two hours

WordPress Yellow Pencil Plugin Flaws Actively Exploited

Assange arrested, faces extradition for hacking

North Korea’s Hidden Cobra Strikes U.S. Targets with HOPLIGHT

Romanian Duo Convicted of Malware Scheme Infecting 400,000 Computers

Russia Fines Facebook $47 Over Citizens' Data Privacy Dispute

Fake Instagram assistance apps found on Google Play are stealing passwords

New linux privilege Escalation techniques abusing sudo token

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

Rootpipe Reborn Part I: CVE-2019–8513 TimeMachine root command injection

Researcher Reveals Multiple Flaws in Verizon Fios Routers

Samsung Galaxy S10 Fingerprint Sensor Duped With 3D Print

Intel Patches High-Severity Flaws in Media SDK, Mini PC

Say hello to Baldr, a new stealer on the market

Mar-a-Lago intruder had instant-malware-inflicting thumb drive

Spam Campaigns Spread TrickBot Malware with Tax Lure

Microsoft Releases First Preview Builds of Chromium-based Edge Browser

Microsoft Products Under EU Investigation About Data Collection

New Mirai Samples Grow the Number of Processors Targets

'Digital Doppelganger' Underground Takes Payment Card Theft to the Next Level

OceanLotus: macOS malware update

Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware

Facebook Boots 74 Cybercrime Groups From Platform

LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files

Adversarial Machine Learning against Tesla's Autopilot

Chinese hackers poke the Bayer, but German giant says it withstood attack

Unpatched Flaw in Xiaomi's Built-in Browser App Lets Hackers Spoof URLs

540 Million Facebook User Records Found On Unprotected Amazon Servers

WordPress iOS App Bug Leaked Secret Access Tokens to Third-Party Sites

OceanLotus APT Uses Steganography to Shroud Payloads

Georgia Tech Data Breach Exposes 1.3 Million Users' Personal Data 

Facebook Caught Asking Some Users Passwords for Their Email Accounts

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

2m credit cards ripped off from restaurant chain, sold on the dark web

New Apache Web Server Bug Threatens Security of Shared Web Hosts

Restaurant Chains Hit in PoS Attack

Russia accused of massive GPS spoofing campaign

Exodus: New Android Spyware Made in Italy