Daily NCSC-FI news followup 2019-10-12

These are the 29 countries vulnerable to Simjacker attacks

www.zdnet.com/article/these-are-the-29-countries-vulnerable-to-simjacker-attacks/ Adaptive Mobile publishes the list of countries where mobile operators ship SIM cards vulnerable to Simjacker attacks.. Simjacker attacks spotted in Mexico, Colombia and Peru.

Nemty 1.6 Ransomware Released and Pushed via RIG Exploit Kit

www.bleepingcomputer.com/news/security/nemty-16-ransomware-released-and-pushed-via-rig-exploit-kit/ The RIG exploit kit is now pushing a cocktail of malware that includes a new variant of the Nemty Ransomware. . According to security firm Tesorion, Nemty 1.6 also modified their encryption algorithm to use the Windows cryptographic libraries instead of their own custom AES implementation. . This was most likely done to break the decryptor created by Tesorion, which didn’t go as plan as Tesorion’s decryptor can still decrypt Nemty 1.6 victims for free.

Mikä moka: tiedustelupalvelu osti nollapäivähaavoittuvuuksia – omalla koneella ollut virusskanneri aiheutti melkoisen yllätyksen

www.mikrobitti.fi/uutiset/mb/6bc5e739-52d6-4fd8-a990-92130396c0d7 Uzbekistanin uusi tiedustelupalvelu SandCat oli työssään niin kujalla, että se paitsi vuosi oman hyökkäystyökalunsa tietoturvatutkijoille, myös paljasti vahingossa Saudi-Arabian käyttämiä iskumetodeja.. see also

www.vice.com/en_us/article/9kxp83/researchers-easily-trick-cylances-ai-based-antivirus-into-thinking-malware-is-goodware

Decades-Old Code Is Putting Millions of Critical Devices at Risk

www.wired.com/story/urgent-11-ipnet-vulnerable-devices/ Nearly two decades ago, a company called Interpeak created a network protocol that became an industry standard. It also had severe bugs that are only now coming to light.

Attackers Create Elaborate Crypto Trading Scheme to Install Malware

www.bleepingcomputer.com/news/security/attackers-create-elaborate-crypto-trading-scheme-to-install-malware/ Security researcher MalwareHunterTeam discovered a scheme where an attacker has created a fake company that is offering a free cryptocurrency trading platform called JMT Trader. When this program is installed, it will also infect a victim with a backdoor Trojan.. Possible ties to the Lazarus APT group

You might be interested in …

Daily NCSC-FI news followup 2020-03-15

CovidLock: Mobile Coronavirus Tracking App Coughs Up Ransomware www.domaintools.com/resources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware Cybercriminals like to exploit people when they are at their most vulnerable. They use dramatic events that cause people to be emotional or fearful to drive their profits. Any time there are major news cycles happening on a topic that stirs a strong reaction, cybercriminals will […]

Read More

Daily NCSC-FI news followup 2019-08-04

Extortion Emails on the Rise: A Look at The Different Types www.bleepingcomputer.com/news/security/extortion-emails-on-the-rise-a-look-at-the-different-types/ No matter the theme of an extortion scam, their goal is all the same. To scare you into thinking the attackers have information or video about you so that you make a bitcoin payment to avoid the information from being released.. Below we […]

Read More

Daily NCSC-FI news followup 2020-07-14

Microsoft July 2020 Patch Tuesday: 123 vulnerabilities, 18 Critical! www.bleepingcomputer.com/news/microsoft/microsoft-july-2020-patch-tuesday-123-vulnerabilities-18-critical/ This Patch Tuesday is the second-largest update ever, with the largest one being issued in June 2020 with 129 fixes. 17-Year-Old Critical ‘Wormable’ RCE Vulnerability Impacts Windows DNS Servers thehackernews.com/2020/07/windows-dns-server-hacking.html Microsoft patched today a new highly critical “wormable” vulnerability – – carrying a severity score […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.