Cyber-security Recap - 16 to 30 SEP 19

-



After adapting their code, a group of Russian-government-linked hackers last month launched a phishing campaign against embassies and foreign affairs ministries of countries in Eastern Europe and Central Asia, researchers said Tuesday. The hackers, dubbed Sednit by Slovakian cybersecurity company ESET, haven’t been too discreet in their attempts to...

Vulnerability in iOS 13 and iPadOS affects keyboards installed for iPhone, iPad, or iPod touch.

A known threat actor, Tortoiseshell, is targeting U.S. military veterans with a fake veteran hiring website that hosts malware.

Clyde Hewitt, executive advisor of cybersecurity firm CynergisTek, said Microsoft's security vulnerability alert provides a "teachable moment" for chief ...

Major automakers are moving full steam ahead with their plans to put self-driving cars on the road, even as lawmakers and regulators in Washington fall behind on creating a cybersecurity framework for those vehicles.The issue of cybersecurity is...

Andrei Tyurin is the first to be convicted in one of the largest thefts of customer data from a single US financial institution in history.

While much of the attention around California’s recently passed Assembly Bill 5 (AB5) has focused on the future for Uber and Lyft drivers, bug bounty contractors working in California could also argue they’re covered under the law when it goes into effect next year. California Gov. Gavin Newsom on Sept. 18 signed AB5, which changes how employers can...

Now is a very good time to patch your estate Cisco has doled out yet more security updates for its IOS and IOS XE network operating systems, which, we are obliged to remind you, is its scheduled six-monthly patch run and not the usual "oh bugger" state of affairs.…


One Cisco bug impacting its 800 and 1000 series routers had a CVSS severity score of 9.9.

After finding security weaknesses in two ballot-marking devices at this year’s DEF CON Voting Village, researchers are calling for “more comprehensive studies” of equipment that is increasingly a part of the voter experience. The findings come as states consider the security advantages of election systems that create a paper trail. Ballot-marking devices,...

President facing impeachment probe, Brexit off the rails... but more importantly, your Dunkies account was potentially pwned The US state of New York is suing food chain Dunkin Donuts for what is says is an illegal lapse in computer security.…

  
Accessed information includes delivery addresses, license numbers, names, phone numbers and more.


There have been reports a cyber attack hit some petrochemical and other companies in Iran Sept. 21, which a state body in charge of cyber security ...


The top European Union court has determined that to store internet users' cookies, website operators need to receive "active consent." The decision on Tuesday came in response to a disagreement between German company Planet49 and a...


An ex-Yahoo! employee has pleaded guilty to misusing his access at the company to hack into the accounts of nearly 6,000 Yahoo users in search of private and personal records, primarily sexually explicit images and videos. According to an press note released by the U.S. Justice Department, Reyes Daniel Ruiz, a 34-year-old resident of California...

There's some interesting new research about Russian APT malware: The Russian government has fostered competition among the three agencies, which operate independently from one another, and compete for funds. This, in turn, has resulted in each group developing and hoarding its tools, rather than sharing toolkits with their counterparts, a common...



For a fee, of course Recognising that not everyone has climbed aboard the Windows 10 train, Microsoft has thrown a Window 7 Extended Support lifeline to more businesses... for a price.…

Multiyear campaigns stretching back to at least 2014 have been seen using zero-days in region-specific software.

Bad OpSec led to the botnet's discovery -- revealing 800,000 victims in Russia.

The feature will check the strength of saved passwords and alert users when they're compromised in a breach.

The FBI is reportedly using Facebook ads to gather intelligence on Russia, specifically targeting those who may be or know Russian spies. The FBI is running ads in the Washington, D.C., area, CNN reported on Wednesday, that direct to ...

Cops also Cruyff cloggy couple Dutch police said in a translated news release that they have busted a local 'bulletproof' server hosting operation in a major takedown that also nabbed a pair of Mirai botnet operators.…

An unprotected Elasticsearch cluster contained personally identifiable information on Russian citizens from 2009 to 2016.

Eight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files.

Capital One failed to maintain appropriate information security practices, including failing to protect its customers' personal information from hackers ...


Their findings demonstrate how Group 4 is likely conducting server-side skimming in addition to client-side activity.

Exabeam, a security information and event management (SIEM) platform provider, has integrated MITRE ATT&CK Framework labels into its Security ...

The ransomware attack infected computers at DCH Regional Medical ... The UK's National Cyber Security Centre (NCSC) in July issued a warning ...

The Trump administration is planning to urge Facebook to hold off on incorporating end-to-end encryption across its various messaging services until the company can address “public safety” issues with law enforcement agencies around the world.In an...

Bug gives attackers a way to use GIF images to steal data from Android devices running the message app.
For years, Uzbekistan’s feared intelligence agency, the National Security Service, has been accused of aggressively spying on citizens and abusing human rights in the Central Asian country under the guise of its counterterrorism and security operations. Now, the NSS’s reported use of hacking tools in that activity is coming into clearer view, thanks...

This malicious O.MG Lightning cable has come a long way, with extensive work on the kinds of payload it can deliver.

The Food and Drug Administration (FDA) on Tuesday warned patients, providers and manufacturers about cybersecurity vulnerabilities in certain medical devices and health care networks.The vulnerabilities, referred to by the agency as URGENT/11, have...


Fileless threat leverages widely used Node.js framework and WinDivert packet-capture utility to turn infected machines into proxies for malicious behavior.

Match.com allegedly put users on its free version at risk - by not filtering out communications that it knew were from fake accounts.

The malware landscape continues to evolve with the re-emergence of the GandCrab operators and a continued spearphishing attack spreading the LookBack RAT.

Watch out Windows users! There's a new strain of malware making rounds on the Internet that has already infected thousands of computers worldwide and most likely, your antivirus program would not be able to detect it. Why? That's because, first, it's an advanced fileless malware and second, it leverages only legitimate built-in system utilities...

It's an arms race: as detection methods improve, deepfake-generating algorithms are quickly updated to correct the flaws.


The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.

In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.

This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.

Contxto – Earlier today, the Bank of Mexico (Banxico) announced a major cybersecurity alert through its Interbank Electronic Payment System.

The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.

Remember the Simjacker vulnerability? Earlier this month, we reported about a critical unpatched weakness in a wide range of SIM cards, which an unnamed surveillance company has actively been exploiting in the wild to remotely compromise targeted mobile phones just by sending a specially crafted SMS to their phone numbers. If you can recall,...

September 27, 2019 - The Department of Homeland Security Cybersecurity and Infrastructure Security Agency issued an alert notifying all sectors of ...

Ernst & Young (EY), a Top 200 MSSP for 2019, has acquired Canadian cybersecurity solutions provider ElevatedPrompt Solutions Inc. for an ...

Microsoft, Mastercard, the Hewlett Foundation and other groups this week announced the launch of an independent institute aimed at investigating cyberattacks and assisting victims.The CyberPeace Institute will work to coordinate recovery efforts for...

Under the Protecting Resources on the Electric Grid with Cybersecurity ... utility regulators across the U.S. have been on high alert for potential cyberattacks, ... The review examined cybersecurity at four state utilities and found the ...

A Pakistani hacker who previously made headlines earlier this year for selling almost a billion user records stolen from nearly 45 popular online services has now claimed to have hacked the popular mobile social game company Zynga Inc. With a current market capitalization of over $5 billion, Zynga is one of the world's most successful social game...

Apple's iOS 13 is suffering from a number of bugs and security problems. ... Despite the fact that you can't see it, the Touch ID dialog prompt hasn't ...

Look, it's CB3ROB – remember them? Cops have seized the physical premises and servers of the Dutch-German ISP that once hosted The Pirate Bay – after storming the hosting biz's ex-NATO bunker hideout with 600 gunmen.…

New legislation has been approved by the U.S. senate aimed at protecting local cities and schools from ransomware attacks.

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troublesome when it came to sensitive data, such as password...

Flaw in National Security Agency's Ghidra reverse-engineering tools allows hackers to execute code in vulnerable systems.

Transport Layer Security (TLS) can be critical for security, but it must be deployed in a current version. Microsoft now provides a mechanism for administrators to guarantee the right version in their network.

Enlarge (credit: Thomas Trutschel/Photothek via Getty Images) When you visit a new website, your computer probably submits a request to the domain name system (DNS) to translate the domain name (like arstechnica.com) to an IP address. Currently, most DNS queries are unencrypted, which raises privacy and security concerns. Google and Mozilla are...


Find everything you need to know to stay one step ahead with SANS next month Promo  Hosted by the UK government’s National Cyber Security Centre (NCSC) and training specialist SANS Institute, the two-day CyberThreat Summit 2019 in London this autumn is a highly informative technical event bringing together security practitioners from the UK and Europe.…

The 'super camera' can identify people dozens of meters away using facial recognition.

If you have an account with the Comodo discussion board and support forums, also known as ITarian Forum, you should change your password immediately. Cybersecurity company Comodo has become one of the major victims of a recently disclosed vBulletin 0-day vulnerability, exposing login account information of over nearly 245,000 users registered with...

The eGobbler threat actor is back with a new malvertising campaign that has hijacked more than 1 billion sessions.

Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the US. There are four key implications of this revolution that policymakers in the national security sector will need to address: The first is that the unprecedented scale and pace of technological...

By Jaromir Horejsi and Joseph C. Chen (Threat Researchers) We found a new modular fileless botnet malware, which we named “Novter,” (also reported and known as “Nodersok” and “Divergent”) that the KovCoreG campaign has been distributing since March. We’ve been actively monitoring this threat since its emergence and early development, and saw it being…

Looking for ways to unlock and read the content of an encrypted PDF without knowing the password? Well, that's now possible, sort of—thanks to a novel set of attacking techniques that could allow attackers to access the entire content of a password-protected or encrypted PDF file, but under some specific circumstances. Dubbed PDFex, the new...

Posted by Chris Thompson, Chrome security team[Cross-posted from the Chromium blog]Last October we announced our plans to remove support for TLS 1.0 and 1.1 in Chrome 81. In this post we’re announcing a pre-removal phase in which we’ll introduce a gentler warning UI, and previewing the UI that we’ll use to block TLS 1.0 and 1.1 in Chrome 81. Site administrators...

A former Yahoo software engineer pleaded guilty Monday to hacking into about 6,000 Yahoo accounts for the purpose of finding nude images and videos of the account holders. Reyes Daniel Ruiz, 34, admitted in federal court Monday that he targeted the accounts of younger women, including his personal friends and work colleagues, in order to pull images...


Microsoft is about to put another 38 file extensions on its 'too risky to receive' blocklist.

A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers. Exim maintainers today released an urgent security update—Exim version 4.92.3—after publishing an early warning two...

We discovered a series of incidents where the credit card skimming attack Magecart was used to hit the booking websites of chain-brand hotels — the second time we’ve seen a Magecart threat actor directly hit ecommerce service providers instead of going for individual stores or third-party supply chains. Back in May, we discovered a new Magecart-using...