NCSC-FI News followup

Daily NCSC-FI news followup 2020-02-26

Iranian APT Targets Govs With New Malware A new campaign is targeting governments with the ForeLord malware, which steals credentials.. A never before seen credential-stealing malware, dubbed ForeLord, has been uncovered in recent spear phishing emails. Researchers have attributed the campaign to a known Iranian advanced persistence threat (APT) group.

Internal Docs Show Why the U.S. Military Publishes North Korean and Russian Malware A previously secret document obtained by Motherboard shows how, and why, CYBERCOM is publicly releasing malware from adversaries.

Zyxel 0day Affects its Firewall Products, Too On Monday, networking hardware maker Zyxel released security updates to plug a critical security hole in its network attached storage (NAS) devices that is being actively exploited by crooks who specialize in deploying ransomware.. Today, Zyxel acknowledged the same flaw is present in many of its firewall products.

Flaw in billions of Wi-Fi devices left communications open to eavesdropping Cypress and Broadcom chip bug bit iPhones, Macs, Android devices, Echoes, and more.. also: also:

Hackers Scanning for Vulnerable Microsoft Exchange Servers, Patch Now! Attackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable to the CVE-2020-0688 remote code execution vulnerability patched by Microsoft two weeks ago.. To exploit this flaw attackers only have to find vulnerable servers that are accessible on the Internet, search for email addresses they collect from the Outlook Web Access (OWA) portal URL, and get relevant dumps from previous data breaches.. Next, they only have to launch a credential stuffing attack and keep at it until they get a

DoppelPaymer Hacked Bretagne Télécom Using the Citrix ADC Flaw Cloud services provider Bretagne Télécom was hacked by the threat actors behind the DoppelPaymer Ransomware using an exploit that targeted servers unpatched against the CVE-2019-19781 vulnerability.

Admins beware! Microsoft gives heads-up for ‘disruptive’ changes to authentication in Office 365 email service Basic authentication will be OFF for Exchange Online email and other services from October 2020

New CWE List of Common Security Weaknesses With version 4.0, the CWE list expands to include hardware security weaknesses. Additionally, version 4.0 simplifies the presentation of weaknesses into various views and adds a search function to enable easier navigation of the information.

Suomalaisten puhelimiin tulee huijausviestejä älä klikkaa linkkiä Ainakin viikon verran jatkunutta huijausta tehdään PostNordin nimissä.

Firefox, you know you tapped Cloudflare for DNS-over-HTTPS? In January, it briefly knackered two root servers at the heart of the internet A bug in software pushed out by Cloudflare resulted in failures at the heart of the web’s infrastructure, according to a report published this week by the Internet Systems Consortium (ISC).

Rotherwood Healthcare AWS bucket security fail left elderly patients’ DNR choices freely readable online Plus birth certificates, job interview data and more

Chrome 80 update cripples top cybercrime marketplace 90% of all stolen credentials on the Genesis Store came from the AZORult malware. Now, the malware doesn’t work in Chrome 80.

Stalkerware Attacks Increased 50 Percent Last Year, Report Research puts the emerging mobile threatwhich monitors the whereabouts and device activity of devices users as well as collects personal datainto clearer focus.

Unpatched Security Flaws Open Connected Vacuum to Takeover A connected, robotic vacuum cleaner has serious vulnerabilities that could allow remote hackers to view its video footage and launch denial of service attacks.

Facial-Recognition Company That Works With Law Enforcement Says Entire Client List Was Stolen

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0) [With IOCs] The new command and control (C2) protocol that was implemented in one of the 4.0 samples was completely different from the existing understanding of the 3.0 protocol.. TAU is providing this analysis as well as the investigation results of discovered C2s or victim hosts infected with the server variants on the Internet.

Tracking Kimsuky, the North Korea-based cyber espionage group: Part 1 For years, we have tracked the espionage threat actor we call Black Banshee (also known in open source as Kimsuky). In 2019, it launched multiple parallel cyber espionage campaigns, from large-scale credential harvesting to narrowly targeted espionage and exfiltration operations.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.