Emotet-haittaohjelmaa levitetään aktiivisesti Suomessa
www.kyberturvallisuuskeskus.fi/fi/emotet-haittaohjelmaa-levitetaan-aktiivisesti-suomessa Emotet-haittaohjelmaa levitetään sähköpostitse suomalaisten organisaatioiden nimissä. Haittaohjelmahyökkäyksen tarkoituksena on varastaa organisaatioista tietoja, ja samalla hyökkäyksellä on mahdollista tunkeutua verkkoon syvemmälle ja käynnistää esimerkiksi kiristyshaittaohjelmahyökkäys. Hyökkäyskampanja on näkynyt aktiivisena 17.8.2020 alkaen.. see also
www.is.fi/digitoday/tietoturva/art-2000006605860.html
World’s largest cruise line operator discloses ransomware attack
www.zdnet.com/article/worlds-largest-cruise-line-operator-discloses-ransomware-attack/ Carnival Corp says it suffered a ransomware attack on Saturday, August 15, and that hackers stole some of its data.
EmoCrash Exploit Stoppered Emotet For 6 Months
threatpost.com/emocrash-exploit-emotet-6-months/158414/ A researcher developed a killswitch exploiting a buffer overflow in Emotet preventing the malware from infecting systems for six months.
Critical Jenkins Server Vulnerability Could Leak Sensitive Information
thehackernews.com/2020/08/jenkins-server-vulnerability.html Jenkinsa popular open-source automation server softwarepublished an advisory on Monday concerning a critical vulnerability in the Jetty web server that could result in memory corruption and cause confidential information to be disclosed.
IcedID Trojan Rebooted with New Evasive Tactics
threatpost.com/icedid-trojan-rebooted-evasive-tactics/158425/ Juniper identifies phishing campaign targeting business customers with malware using password protection, among other techniques, to avoid detection.
US Army report says many North Korean hackers operate from abroad
www.zdnet.com/article/us-army-report-says-many-north-korean-hackers-operate-from-abroad/ US Army says many North Korean hackers are actually located outside the hermit kingdom, in countries like Belarus, China, India, Malaysia, and Russia.
COVID-19 Pandemic Persists While Extortion Ransomware Operators Run Rampant
www.recordedfuture.com/pandemic-ransomware-operators/ Two major trends in malware development and deployment dominated headlines throughout the first half of 2020: COVID-19 and extortion ransomware. 2020 has been a challenging year, and the cyber threat landscape was no exception.
Ukraine arrests gang who ran 20 crypto-exchanges and laundered money for ransomware gangs
www.zdnet.com/article/ukraine-arrests-gang-who-ran-20-crypto-exchanges-and-laundered-money-for-ransomware-gangs/ Gang is believed to have laundered more than $42 million in criminal proceeds.
Please stop hard-wiring AWS credentials in your code. Looking at you, uni COVID-19 track-and-test app makers
www.theregister.com/2020/08/17/albion_college_coronavirus_tracking_app/ Albion College has a plan for students to return safely to campus this fall amid the COVID-19 coronavirus pandemic. It involves being tracked by an app that, at least until a few days ago, appears to have been insecure.
Large Orgs Plagued with Bugs, Face Giant Patch Backlogs
threatpost.com/large-orgs-plagued-bugs-patch-backlogs/158433/ Vulnerability management continues to challenge businesses, as they face tens of thousands of bugs with every scan.
How cybercriminals victimize WoW players
www.kaspersky.com/blog/wow-phishing/36752/ How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
Tämä tietoturvatiimien sokea piste kasvaa koronan myötä
www.tivi.fi/uutiset/tv/94f4b44d-231e-4182-94bf-96d676d83a4f Yrityksillä ei ole keinoja sanella sitä, millaisia iot-laitteita etätyötä tekevät kotiverkoissaan käyttävät. It-osastoilla on aika vähän vaihtoehtoja suojata firmojen tärkeää dataomaisuutta.