Daily NCSC-FI news followup 2020-10-09

We Hacked Apple for 3 Months: Here’s What We Found

samcurry.net/hacking-apple/ There were a total of 55 vulnerabilities discovered with 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity reports. As of now, October 8th, we have received 32 payments totaling $288, 500 for various vulnerabilities. However, it appears that Apple does payments in batches and will likely pay for more of the issues in the following months.

Ryuk’s Return

thedfirreport.com/2020/10/08/ryuks-return/ The Ryuk group went from an email to domain wide ransomware in 29 hours and asked for over $6 million to unlock our systems. They used tools such as Cobalt Strike, AdFind, WMI, vsftpd, PowerShell, PowerView, and Rubeus to accomplish their objective.

German tech giant Software AG down after ransomware attack

www.zdnet.com/article/german-tech-giant-software-ag-down-after-ransomware-attack/ Exclusive: The Clop ransomware gang is demanding more than $20 million from German tech firm Software AG. Software AG is Germany’s second-largest company with more than 10, 000 enterprise customers across 70 countries. Some of the company’s most recognizable customers include Fujitsu, Telefonica, Vodafone, DHL, and Airbus.

Sophisticated Android Ransomware Executes with the Home Button

threatpost.com/android-ransomware-home-button/160001/ A fresh variant of a sophisticated Android ransomware known as MalLocker locks up mobile devices — surfacing its ransom note when a user hits the Home button. Lisäksi:

www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/

Facebook Debuts Bug-Bounty ‘Loyalty Program’

threatpost.com/facebook-bug-bounty-loyalty-program/159993/ Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports which will dictate new bonus percentages. For instance, Bronze tier members will receive a 5 percent bonus on top of each bounty they receive — while Diamond tier members will earn a 20 percent bonus. Diamond-level researchers also gain access to various events, including live hacking events, Facebook’s F8 conference and DEFCON.

You might be interested in …

Daily NCSC-FI news followup 2020-11-19

Tahmaako netti? Liisa-myrskyn aiheuttamia tuhoja korjaillaan www.tivi.fi/uutiset/tv/e78e181b-62f7-45cb-ac38-e30eee4f8017 Liisa-myrskyn aiheuttamat sähkökatkokset aiheuttavat parhaillaan häiriöitä matkapuhelinverkossa. Accused Ringleader of FIN7 Hacking Group Pleads Guilty www.bankinfosecurity.com/accused-ringleader-fin7-hacking-group-pleads-guilty-a-15397 Andrii Kolpakov, who is a Ukrainian national, pleaded guilty to charges of conspiracy to commit wire fraud and conspiracy to commit computer hacking. He faces up to a 25-year federal prison term […]

Read More

Daily NCSC-FI news followup 2019-10-30

Major vulnerability patched in the EU’s eIDAS authentication system www.zdnet.com/article/major-vulnerability-patched-in-the-eus-eidas-authentication-system/ Vulnerability would have allowed attackers to pose as any EU citizen or business. SEC Consult researchers said they found that current versions of the eIDAS-Node package fail to validate certificates used in eIDAS operations, allowing attackers to fake the certificate of any other eIDAS citizen […]

Read More

Daily NCSC-FI news followup 2020-03-11

Warning Unpatched Critical ‘Wormable’ Windows SMBv3 Flaw Disclosed thehackernews.com/2020/03/smbv3-wormable-vulnerability.html Shortly after releasing its monthly batch of security updates, Microsoft late yesterday separately issued an advisory warning billions of its Windows users of a new critical, unpatched, and wormable vulnerability affecting Server Message Block 3.0 (SMBv3) network communication protocol. Beware of ‘Coronavirus Maps’ It’s a malware […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.