NCSC-FI News followup

Daily NCSC-FI news followup 2019-10-01

Yritysten kybervarautumisen tilanne ei juurikaan ole muuttunut uhat ovat yleistyneet Selvitys tehtiin syksyllä 2019 yhteistyössä CyVantage LLC:n kanssa. Yrityksiin kohdistuvat kyberuhat 2019 -selvitys osoittaa että niin yritysten kuin viranomaisten toiminnassa torjua kyberuhkia on paljon kehitettävää. Selvitys on kolmas, mikä aiheesta on tehty.

Comodo Forums Breached, Data of Over 170,000 Users Up for Grabs Account data belonging to more than half of all Comodo Forums users has been stolen and is now traded online. The breach was possible by exploiting a vulnerability in the software that powers the forum. “Very recently a new vulnerability in the vBulletin software, which is one of the most popular server applications for website comments including the Comodo Forums, was made public,”

Centralised DoH is bad for privacy, in 2019 and beyond In this post I argue that in September 2019, centralised DoH by default is a net-negative for privacy for everyone and that even in later years it will not improve privacy outside of the most privacy hostile environments where no one should rely on partial measures like DoH to stay secure.

Simjacker: SIM-based phone hacking Recently, experts at AdaptiveMobile Security discovered a method of attack on mobile phones that can be carried out using a normal computer and a dirt-cheap USB modem.

Head Fake: Tackling Disruptive Ransomware Attacks Within the past several months, FireEye has observed financially-motivated threat actors employ tactics that focus on disrupting business processes by deploying ransomware in mass throughout a victims environment. In this post, well provide a technical examination of one recent campaign that stems back to a technique that we initially reported on in April 2018.

The dark web’s latest offering: Disinformation as a service Cyber criminals are following in the footsteps of nation states by offering disinformation services but rather than attempting to influence elections or political discourse, these influence campaigns are being advertised to the private sector.

Some Victorian hospitals are offline after ransomware hit A number of Victorian hospitals have disconnected themselves from the internet in an attempt to quarantine a ransomware infection. The Victorian government is working with the health services, police, and Australian Cyber Security Centre to fix the incident.

Ransomware incident to cost Danish company a whopping $95 million Demant, one of the world’s largest manufacturers of hearing aids, expects to incur losses of up to $95 million following what appears to be a ransomware infection that hit the company at the start of the month.

Under-Detected ODT Files Deliver Common Remote Access Trojans Security researchers noticed multiple cybercriminal operations using OpenDocument Text (ODT) files to distribute malware that is typically blocked by antivirus engines. The campaigns target English and Arabic-speaking users.

Mariposa Botnet Author, Darkcode Crime Forum Admin Arrested in Germany A Slovenian man convicted of authoring the destructive and once-prolific Mariposa botnet and running the infamous Darkode cybercrime forum has been arrested in Germany on request from prosecutors in the United States, whove recently re-indicted him on related charges.

New Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaign We found a new modular fileless botnet malware, which we named Novter, (also reported and known as Nodersok and Divergent) that the KovCoreG campaign has been distributing since March. Weve been actively monitoring this threat since its emergence and early development, and saw it being frequently updated.

Fake Office Activation Wizard Docs Used to Spread Emotet Trojan The Emotet botnet has switched to a new template used by malicious attachments that pretend to be a Microsoft Office Activation Wizard. When conducting spam campaigns, the actors behind Emotet will use malicious Word document templates that are designed to trick recipients into enabling macros in the document.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.