NCSC-FI News followup

Daily NCSC-FI news followup 2019-08-02

LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards Between July 19 and July 25, 2019, several spear phishing emails were identifiedtargeting three US companies in the utilities sector. . The phishing messages were found to contain a Microsoft Word document attachment that uses VBA macros to installLookBack malware.. LookBackmalware is a remote accessTrojanwritten in C++ that relies on a proxy communication tool to relay datafrom the infected host to a command and control IP.

WaterISAC: 15 Security Fundamentals You Need to Know WaterISAC published 15 guidelines which water and wastewater utilities can use to protect against digital threats.

Why Every Organization Needs an Incident Response Plan OK, perhaps that’s obvious. The question is, how come so many organizations still wait for an incident to trigger their planning?

What Capital One’s cybersecurity team did (and did not) get right There was no months-old, unpatched Apache flaw. A S3 bucket wasnt publicly accessible to anyone with an internet connection. There was no effort to hide what happened behind the companys bug bounty program.. While its tempting to knock Capital One for this breach, theres a lot they got right, said Mark Orlando, the chief technology officer for cyber protection solutions at Raytheon.. also:

Scammer Arrested After Defrauding US Universities of Over $870K Amil Hassan Raage was arrested for defrauding two U.S. Universities of more than $870,000 as part of a business email compromise (BEC) fraud scheme he ran during last year.. Raage pleaded guilty of receiving multiple payments totaling $749,158.37 from the University of California San Diego (UCSD) and $123,643.77 from a Pennsylvania university.

Varo uutta kiristysohjelmaa tutulta tullut tekstiviesti voi tehdä puhelimelle tylyn tempun Android-puhelimiin levitetään seksisimulaattorilta näyttävää ohjelmaa, joka ei todellakaan tarjoa tyydytystä muille kuin rikollisille.

DHCP Client Remote Code Execution Vulnerability Demystified CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for DHCP client services in a system, is vulnerable to malicious DHCP reply packets.. This vulnerability allows remote code execution if the user tries to connect to a network with a rogue DHCP Server, hence making it a critical vulnerability.

Eavesdropping smartphones: Fact or fiction? Its an oft-repeated tale: Someone talks with a friend about a certain thing, and then, bang, an ad for it appears on the smartphone screen.

GermanWiper ransomware hits Germany hard, destroys files, asks for ransom For the past week, a new ransomware strain has been wreaking havoc across Germany. Named GermanWiper, this ransomware doesn’t encrypt files but instead it rewrites their content with zeroes, permanently destroying users’ data.. As a result, any users who get infected by this ransomware should be aware that paying the ransom demand will not help them recover their files.

Cobalt Group Returns To Kazakhstan Cobalt Group is a financially motivated cyber-crime gang that has been active since at least 2016. The group is mainly interested in carrying out attacks against banks, in an attempt to access the banks internal networks and potentially take over sensitive components, such as ATM-controlling servers or card-processing systems. . Although the Europol arrested Cobalt Groups leader in 2018, the group remains active until this day.

Lotsy group targets Italian and Spanish-speaking users Group-IB discovered massive fraudulent campaigns carried out by Lotsy group involving the use of dozens of well-known brands aimed at Italian and Spanish-speaking customers.. Group-IB has discovered a new wave of massive fraudulent campaigns involving the use of dozens of well-known brands including Alitalia, Carrefour, Conad, etc. . Italian and Spanish-speaking customers have become the primary targets of the group of scammers, dubbed Lotsy by Group-IB, whose aim is to trick people into visiting websites for marketing purposes.

– From Carnaval to Cinco de Mayo The journey of Amavaldo The first in an occasional series demystifying Latin American banking trojans. We have learned a lot we have identified more than 10 new malware families, studied the distribution chains and linked them to the new families accordingly, and dissected the internal behavior of the banking trojans. . In this initial blog post, we will start by describing this type of banking trojan in general and then move to the first newly identified malware family well discuss Amavaldo.

APT trends report Q2 2019 For two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. . The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. . They aim to highlight the significant events and findings that we feel people should be aware of.. This is our latest installment, focusing on activities that we observed during Q2 2019.

Kokemäen kaupunki kaiveli varmuuskopioitaan kiristysohjelman lukitsemasta datasta osa saatu avattua Kokemäen tietomurron tuhot ovat hallintojohtaja Mikko Löfbackan mukaan pelättyä pienemmät. Osa järjestelmistä on jo saatu palautettua testikäyttöön. Löfbacka arvioi, että viikon päästä ne saattavat olla jo julkisessa käytössä.

Apple keskeyttää käytäntönsä, jossa työntekijät ovat kuunnelleet älylaitteista tallennettua puhetta Teknologiayhtiö Apple keskeyttää käytäntönsä, jossa sen alihankkijoiden työntekijät ovat kuunnelleet Siri-sovellukselle saneltuja ääniviestejä.. Apple keskeyttää luokitteluksi kutsumansa laaduntarkkailun kaikkialla maailmassa. Samalla yhtiö kertoo aikovansa selvittää, kuuleeko Siri komentoja aina oikein vai käynnistyykö se myös vahingossa.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.