Daily NCSC-FI news followup 2019-11-29

Europol Shuts Down ‘Imminent Monitor’ RAT Operations With 13 Arrests

thehackernews.com/2019/11/europol-imminent-monitor-rat.html In a coordinated International law enforcement operation, Europol today announced to shut down the global organized cybercrime network behind Imminent Monitor RAT, yet another hacking tool that allows cybercriminals to gain complete control over a victim’s computer remotely.. see also


The Olympics Goes Political As State Hackers Target Sporting Organisations

www.pandasecurity.com/mediacenter/news/olympics-hackers-target/ According to Microsoft, state-sponsored organisations like the Fancy Bear hacking group have already begun launching attacks. As well WADA, Microsoft has detected another 15 organisations that have been targeted.

Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

blog.trendmicro.com/trendlabs-security-intelligence/operation-endtrade-finding-multi-stage-backdoors-that-tick/ While we have been following cyberespionage group TICK (a.k.a. BRONZE BUTLER or REDBALDKNIGHT) since 2008, we noticed an unusual increase in malware development and deployments towards November 2018.

Got an Oyster card? TfL just locked your account, wants you to reset your password

www.zdnet.com/article/got-an-oyster-card-tfl-just-locked-your-account-to-make-you-reset-your-password/ TfL is asking all Oyster and contactless account holders to reset their passwords to reduce the risk of credential stuffing attacks.

Smartwatch exposes locations and other data on thousands of children

www.welivesecurity.com/2019/11/29/smartwatch-exposes-location-data-children/ A device that is supposed to help parents keep track of their children and give them a peace of mind can be turned into a surveillance device

Advanced Hacking Groups Keep Showing Up, Old Ones Evolve

www.bleepingcomputer.com/news/security/advanced-hacking-groups-keep-showing-up-old-ones-evolve/ Advancements in the threat landscape are clear from one year to another. Since last year, security researchers have seen new adversaries along with methods of compromise and more overt cyberattacks.. Singapore-based cybersecurity company Group-IB describes in a report released today the key changes in the spectrum of high-tech threats recorded since the second half of 2018 and the first half of 2019.

A decade of hacking: The most notable cyber-security events of the 2010s

www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/ The 2010s decade is drawing to a close and ZDNet is looking back at the most important cyber-security events that have taken place during the past ten years.

You might be interested in …

Daily NCSC-FI news followup 2019-10-17

Security researcher publishes proof-of-concept code for recent Android zero-day www.zdnet.com/article/security-researcher-publishes-proof-of-concept-code-for-recent-android-zero-day/ Qu1ckR00t app can root an Android device using the CVE-2019-2215 zero-day. Operation Ghost: The Dukes arent back they never left www.welivesecurity.com/2019/10/17/operation-ghost-dukes-never-left/ ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families. We believe Operation Ghost started in 2013 […]

Read More

Daily NCSC-FI news followup 2020-11-06

Update Your iOS Devices Now 3 Actively Exploited 0-Days Discovered thehackernews.com/2020/11/update-your-ios-devices-now-3-actively.html Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges. Lisäksi: support.apple.com/en-us/HT201222. Lisäksi: us-cert.cisa.gov/ncas/current-activity/2020/11/06/apple-releases-security-updates-multiple-products. Lisäksi: threatpost.com/apple-patches-bugs-zero-days/161010/. Lisäksi: www.zdnet.com/article/apple-fixes-three-ios-zero-days-exploited-in-the-wild. […]

Read More

Daily NCSC-FI news followup 2020-03-30

Revealed: Saudis suspected of phone spying campaign in US www.theguardian.com/world/2020/mar/29/revealed-saudis-suspected-of-phone-spying-campaign-in-us Saudi Arabia appears to be exploiting weaknesses in the global mobile telecoms network to track its citizens as they travel around the US, according to a whistleblower who has shown the Guardian millions of alleged secret tracking requests. Emotet: Dangerous Malware Keeps on Evolving medium.com/threat-intel/emotet-dangerous-malware-keeps-on-evolving-ac84aadbb8de […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.