Tag: Threat Watch – Binary Defense

Advertisement Scam Involving British Retailer Marks & Spencer

Read the original article: Advertisement Scam Involving British Retailer Marks & Spencer A scam involving someone impersonating the CEO of the British retailer Marks & Spencer has been observed by security researchers recently. Advertisements have been posted online that show…

Recent Barnes & Noble Attack Was Likely Egregor

Read the original article: Recent Barnes & Noble Attack Was Likely Egregor New details have emerged about the cyberattack against Barnes & Noble since we last wrote about it on October 16th. After publishing their report last Wednesday, Bleepingcomputer was…

FBI Issues Warning of Spoofed US Census Bureau Site

Read the original article: FBI Issues Warning of Spoofed US Census Bureau Site The Federal Bureau of Investigation (FBI) has issued a flash alert to warn of potentially spoofed domains that attempt to mimic the domain name of the US…

Florida Voter Data Found on Russian Hacking Forum

Read the original article: Florida Voter Data Found on Russian Hacking Forum Personal identity data claimed to be associated with nearly 15 million Florida voters has been found on a well-known Russian hacking site. As of December 2019, there were…

Discord Patches Remote Code Execution Chain Vulnerability

Read the original article: Discord Patches Remote Code Execution Chain Vulnerability Recently, Discord has issued a patch for a critical issue in the desktop version of their messaging app. This critical issue left users exposed to remote code execution (RCE)…

GravityRAT Returns, Targeting Android Devices

Read the original article: GravityRAT Returns, Targeting Android Devices Researchers at Kaspersky Labs published a technical report about Microsoft Windows malware known as GravityRAT that was previously seen in 2017 and 2018 targeting the Indian armed forces. The researchers believe…

Dickey’s BBQ Pit Restaurant Chain Data Theft

Read the original article: Dickey’s BBQ Pit Restaurant Chain Data Theft The largest barbecue restaurant chain, Dickey’s BBQ Pit, suffered a data breach that was discovered this week but appears to have been ongoing since July 2019. The attackers stole…

Barnes & Noble Most Recent Victim of a Cyber Attack

Read the original article: Barnes & Noble Most Recent Victim of a Cyber Attack Book store giant Barnes & Noble has been notifying clients since October 12, 2020, about a cyber-attack. According to the store, on October 10, 2020, they…

SonicWall VPN Vulnerability Could Lead To Remote Code Execution

Read the original article: SonicWall VPN Vulnerability Could Lead To Remote Code Execution Researchers with Tripwire’s VERT have identified a buffer-overflow in SonicWall’s Network Security Appliance, allowing for persistent denial of service. This flaw can be triggered using a custom…

New Financially Motivated Threat Actors Sharing TTPs

Read the original article: New Financially Motivated Threat Actors Sharing TTPs In a recent report, FireEye’s Mandiant publicly announced the identification of a new financially motivated threat group dubbed FIN11. The most notable characteristic of FIN11 is its overlap with…

BleedingTooth Bluetooth Flaw

Read the original article: BleedingTooth Bluetooth Flaw Google has released details of a high-impact security flaw that affects the Bluetooth stack in the Linux kernel versions below 5.9 that support BlueZ. The flaw, tracked as CVE-2020-12351, is “Improper input validation…

Microsoft October Patch Tuesday

Read the original article: Microsoft October Patch Tuesday For this month’s Patch Tuesday, Microsoft took care of 87 vulnerabilities that varied in severity and the product they affected. Two of the more serious vulnerabilities are CVE-2020-16898 and CVE-2020-16947. The first…

Emotet Botnet Takes a Brief Hiatus From Malware Spamming

Read the original article: Emotet Botnet Takes a Brief Hiatus From Malware Spamming Recently, following the release of the public website “HaveIBeenEmotet.com” to allow companies to search for their domain name and find out if they’ve been targeted, Emotet has…

Fitbit Vulnerable to Watch Face Spyware

Read the original article: Fitbit Vulnerable to Watch Face Spyware Immersive Labs director of cyber threat research Kevin Breen developed a proof-of-concept exploit for Fitbit devices after discovering malicious apps could be created using one of the Fitbit API’s. Creating…

Carnival Cruise Line Ransomware Attack

Read the original article: Carnival Cruise Line Ransomware Attack Carnival Corporation, the world’s largest cruise line operator, has confirmed that they were the victim of a ransomware attack that involved the theft of personal information of customers, employees, and ship…

The Evolution of an Android Ransomware Family

Read the original article: The Evolution of an Android Ransomware Family Microsoft has recently published a technical report covering the evolution of an Android-targeting ransomware family.  Android malware doesn’t typically encrypt files, but instead prevents access to the device using…

Fraudulent Apps Can Make Huge Profit

Read the original article: Fraudulent Apps Can Make Huge Profit In a recent move by the Google Play Store, over 240 apps were removed that were infected with fraudulent advertising components. For months, the army of deceptive apps, which were…

Phishing Emails Using Trump COVID-19 Information

Read the original article: Phishing Emails Using Trump COVID-19 Information Researchers at ProofPoint have identified a new phishing campaign that is using the positive COVID-19 test of the President of the United States as a lure in the email. The…

HEH – A new IOT Botnet:

Read the original article: HEH – A new IOT Botnet: Researchers at 360 Netlabs have identified a new P2P IOT botnet named “HEH”.  This botnet, which was written in GO and uses Telnet bruteforcing to spread consists of 3 key…

Malware Campaigns Using Obscure Paste Service

Read the original article: Malware Campaigns Using Obscure Paste Service Research by Juniper Labs has uncovered several malware campaigns using a paste service called “Paste.nrecom.” Using a paste service such as Pastebin.com is nothing new for malware, though many tend…

Ransomware Attacks on the Rise

Read the original article: Ransomware Attacks on the Rise Malware researchers from Check Point and IBM X-Force Incident Response Teams have released data that details the rise of ransomware. The top ransomware families are Maze, Ryuk, and REvil (Sodinokibi) and…

Magecart Attack Compromises Mobile Provider

Read the original article: Magecart Attack Compromises Mobile Provider The Magecart group Fullz House has injected the website of a mobile service provider with a credit card stealer. Magecart is the umbrella term used for all cyber-related crime groups that…

Two Flaws Affecting WordPress Plugin Post Grid

Read the original article: Two Flaws Affecting WordPress Plugin Post Grid Researchers have discovered that two new high severity vulnerabilities are affecting the WordPress plugin Post Grid which has over 60,000 installations. While both flaws are awaiting a CVE number,…

University Hospital New Jersey Pays $670k Ransom

Read the original article: University Hospital New Jersey Pays $670k Ransom After the operators behind the SunCrypt ransomware published nearly 50,000 files stolen from University Hospitals New Jersey (UHNJ), the hospital reached out to the group to negotiate a payment…

Arthur J. Gallagher Discloses Ransomware Attack

Read the original article: Arthur J. Gallagher Discloses Ransomware Attack The well-known US-based insurance firm Arthur J. Gallagher (AJG) disclosed a ransomware attack that occurred on September 26th, 2020. AJG did a fantastic job of responding to the attack as…

Exorcist 2.0 Ransomware Update

Read the original article: Exorcist 2.0 Ransomware Update The cybercriminals behind the Exorcist 2.0 ransomware are now using malicious advertising redirects to trick victims into downloading their malware. According to security researcher Nao_Sec, PopCash malvertising is redirecting users from legitimate…

CMA CGM Reportedly Infected by Ragnar Locker

Read the original article: CMA CGM Reportedly Infected by Ragnar Locker Yesterday, the French maritime transport and logistics company CMA CGM released a statement about an attack impacting its servers. “As soon as the security breach was detected, external access…

REvil RaaS Means Business

Read the original article: REvil RaaS Means Business The REvil ransomware (Sodinokibi) operation has deposited 99 Bitcoins (approximately $1 million USD) on a Russian-speaking hacker forum to prove to its affiliates that they mean business. The ransomware group posted on…

Windows XP Source Code Leaked Online

Read the original article: Windows XP Source Code Leaked Online Recently, the Windows XP source code was leaked onto 4chan as a 42.9GB torrent file, as originally reported by ZDNet. The leak included the source code for Microsoft’s older OS,…

New “Mount Locker” Ransomware Demanding Millions

Read the original article: New “Mount Locker” Ransomware Demanding Millions A relatively new ransomware called Mount Locker is joining several other ransomware families in stealing files before encryption and demanding ransom amounts in the millions. When encrypting files, Mount Locker…

Operation SideCopy

Read the original article: Operation SideCopy Recent findings from Quick Heal’s threat intelligence team revealed that the Indian defense forces have been dealing with an Advanced Persistent Threat (APT) in a long-term campaign that is being called Operation SideCopy. Common…

QNAP NAS Needs Firmware Update

Read the original article: QNAP NAS Needs Firmware Update The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cybersecurity Centre (NCSC) have issued an alert about the QSnatch malware that affects  QNAP NAS devices. A network-attached-storage (NAS)…

CISA Warns of Uptick in LokiBot Stealer

Read the original article: CISA Warns of Uptick in LokiBot Stealer The United States Cybersecurity and Infrastructure Security Agency (CISA) released a warning that the LokiBot information-stealing trojan has seen a resurgence in activity starting in July 2020. LokiBot targets…

Luxottica Hit by Ransomware

Read the original article: Luxottica Hit by Ransomware The eyewear company Luxottica, which is parent company to brands including Ray-Ban and Oakley, has suffered a ransomware attack. On Friday, users on Reddit began reporting that sites for many Luxottica-owned brands…

APT 28 Targeting NATO Members with NATO-Themed Lure

Read the original article: APT 28 Targeting NATO Members with NATO-Themed Lure Originally identified by QuoIntelligence, APT 28 has been distributing Zebrocy malware to NATO members using NATO course themed lures. This campaign ran on August 5th, and arrived on…

Loxottica Hit by Ransomware

Read the original article: Loxottica Hit by Ransomware The eyewear company Luxottica, which is parent company to brands including Ray-Ban and Oakley, has suffered a ransomware attack. On Friday, users on Reddit began reporting that sites for many Luxottica-owned brands…

The Dark Overlord Threat Group Member Pleads Guilty

Read the original article: The Dark Overlord Threat Group Member Pleads Guilty Nathan Wyatt, a member of the threat group known as The Dark Overlord (TDO) was extradited to the United States from the UK in December 2019. Wyatt received…

Phishing Isn’t Just for Money

Read the original article: Phishing Isn’t Just for Money Scammers have tried to rip off computer equipment suppliers with targeted phishing emails that impersonate the Texas Department of State Health Services (DSHS) commissioner. The scammers did their homework and crafted…

IP Photonics Hit with Ransomware

Read the original article: IP Photonics Hit with Ransomware IP Photonics Corp. was hit recently with a ransomware attack that shut down their IT systems worldwide as first reported by Bleeping Computer on Friday. The ransomware used in this attack…

Homicide Case Opened After Ransomware on Dusseldorf Hospital

Read the original article: Homicide Case Opened After Ransomware on Dusseldorf Hospital Originally reported by The Guardian, German prosecutors have opened an investigation into the ransomware attack which resulted in a death, with the anticipated charge of “negligent homicide.” The…

Windows Defender Removes Controversial Download Option

Read the original article: Windows Defender Removes Controversial Download Option Earlier this month, Microsoft met backlash for adding a new “-DownloadFile” command line option to Windows Defender, enabling anyone with some level of access to the system to download files…

Apple Safari RCE Vulnerability

Read the original article: Apple Safari RCE Vulnerability The Safari browser from Apple contains a Remote Code Execution (RCE) vulnerability in its Webkit Feature. An attacker could use this vulnerability to trigger a use-after-free condition in the WebCore, the DOM-rendering…

Threat Actors Send Fake Phishing Training

Read the original article: Threat Actors Send Fake Phishing Training A new phishing campaign has been spotted by email security company KnowBe4 that is trying to lure victims in with a warning to complete their security awareness training within 24…

Ransomware Attack on German Hospital Leads to Fatality

Read the original article: Ransomware Attack on German Hospital Leads to Fatality An attack on the Duesseldorf University Clinic’s systems has led to what might be the first fatality indirectly resulting from a ransomware attack. Last Thursday, an unidentified hacker…

Veteran Affairs Data Breach

Read the original article: Veteran Affairs Data Breach The U.S. Department of Veteran Affairs (VA) has suffered a data breach that exposed the personal information of over 46,000 veterans. In the data breach notification, the VA states that the attackers…

Staples Security Incident

Read the original article: Staples Security Incident The retail office supply chain Staples recently notified its customers that their personal information was exposed through the Staples website. Some are speculating that this is a hacker incident and there is good…

SunCrypt Ransomware Hits New Jersey Hospital

Read the original article: SunCrypt Ransomware Hits New Jersey Hospital University Hospital New Jersey (UHNJ) is apparently the most recent victim of the SunCrypt ransomware. The operators behind SunCrypt claim to have obtained 240GB of data, 1.79GB of which have…

Known Vulnerabilities Being Used Against Government, Private Companies

Read the original article: Known Vulnerabilities Being Used Against Government, Private Companies Yesterday, US-CERT released an advisory on hackers affiliated with China’s Ministry of State Security (MSS) targeting government agencies and private companies through recent high-profile vulnerabilities with readily available…

Razer Data Leak

Read the original article: Razer Data Leak Razer, the gaming hardware manufacturer known for laptops, keyboards, and other high-end gaming devices has suffered a data leak after an exposed database from their online store was discovered. Around August 19th, security…

Maze Ransomware Strikes Fairfax County Public Schools

Read the original article: Maze Ransomware Strikes Fairfax County Public Schools With more than 188,000 students and 25,000 employees, Fairfax County Public Schools in Virginia is one of the largest school districts in the US. A statement from Fairfax County…

APT28 Targets Office 365 Logins With Password Spraying

Read the original article: APT28 Targets Office 365 Logins With Password Spraying APT28 (Russia): The Russian-linked APT28 threat group, also known as Fancy Bear, was seen carrying out a large-scale attack against Office 365 users according to researchers at Microsoft.…

Attackers Actively Abusing WP File Manager Plugin

Read the original article: Attackers Actively Abusing WP File Manager Plugin Last week, a flaw in the WP File Manager plugin for WordPress was discovered being abused in the wild. It was quickly reported and subsequently patched by the developers…

CDRTheif Malware Steals Linux Softswitches VoIP Metadata

Read the original article: CDRTheif Malware Steals Linux Softswitches VoIP Metadata Researches at ESET analyzed new malware named CDRTheif. The malware targets a specific Voice over IP (VoIP) system to steal Call Data Records (CDR) from telephone equipment. The malware…

ProLock Ransomware

Read the original article: ProLock Ransomware Using well-known, typical intrusion tactics, the operators of ProLock ransomware have been able to deploy a large number of attacks at an average rate of nearly one attack per day. Initially, ProLock was named…

Zeppelin Ransomware

Read the original article: Zeppelin Ransomware After not being seen for a while, Zeppelin ransomware is now back and was seen in August by researchers from Juniper Threatlab. Just like previous campaigns, this one starts with an email that includes…

Critical Intel AMT Flaw Patched

Read the original article: Critical Intel AMT Flaw Patched Intel has released their September 2020 platform update addressing nine security vulnerabilities detailed over five security advisories. One of the flaws addressed is within Intel’s Active Management Technology (AMT) platform. AMT…

Visa Warns of New Baka E-Skimmer

Read the original article: Visa Warns of New Baka E-Skimmer Researchers have found a new e-commerce skimmer designed to steal payment card details that also has the interesting ability to remove itself after exfiltrating stolen data. Named Baka, this malware…

Miami High School Student Attacks School Network

Read the original article: Miami High School Student Attacks School Network An unnamed 16-year-old student at the South Miami Senior High School has been attacking the school’s online learning platform. Since the launch of the school year on Monday, the…