Skip to main content

March – Threat Intelligence Bulletin

Top Attacks and Breaches
  • Global fear of the Corona virus epidemic continues to be exploited for malicious cyber operations. Check Point Research reports of thousands of newly registered coronavirus related domains, which are 50% more likely malicious than other domains. CPR also informed of a Trickbot campaign using a fake health warning document to target Italian users.
  • Colorado based space and defense parts manufacturer, Visser Precision, has fallen victim to a DoppelPaymer ransomware Information stolen from Visser and its customers, including Tesla, Lockheed Martin, SpaceX and Boeing, has been published online in another attempt to extort ransom payment.
  • An unidentified demographic and financial information database, hosted on Google cloud, has been left unsecured for more than a month. Containing over 200 million records, the exposed information included name, address, email address, credit rating, income, net worth property info and more.
  • UK based telecom provider Virgin Media has reported an year-long data leak exposing personal information of 900,000 customers, due to misconfiguration of a marketing database.
  • Carnival Corporation cruise operator, the world’s largest travel leisure company, has disclosed a data breach dating April 2019, in which an unidentified third party gained unauthorized access to employees’ accounts, compromising customers’ personal information including SSN and payment details.
  • EVRAZ, one of the largest steel mining companies has been hit by ransomware attack, most likely Ryuk. The company issued a three-day layoff to its employees in in North America. Another Ryuk attack has hit Durham City and County, North Carolina, over the weekend and took down their systems.

Threat Intelligence Reports
  • A report by a South Korean research center finds increased activity of the financially motivated hacking group TA-505, targeting South Korean enterprises. Phishing attempts at finance, manufacturing and medical services included Excel documents delivering “FlawedAmmyy” RAT.
  • A new sample of the Krakoff malware suggests Iranian affiliated APT34 is still active, currently conducting a campaign against the Lebanese government. This ongoing operation, first reported in November 2018, shows continued evolvement of TTPs and capabilities, presently exploiting a Microsoft exchange server.
  • Qihoo 360, China’s largest cyber-security company, has released a report attributing 11 years of offensive cyber activity against Chinese entities to the US CIA, naming the activity APT-C-39. The report links CIA tools like Fluxwire and Grasshopper of the Vault 7 project, details of which were leaked in 2017, to various attacks on China’s aviation industry, scientific research institutions, petroleum industry, large internet companies and government agencies. US press links the report to recent US charges against Chinese APT groups.
  • A recent paper demonstrates the use of ultrasonic guided waves to hack into mobile phones by exploiting voice assistant services. Dubbed SurfingAttack, the attack utilizes hard surfaces to conduct ultrasonic vibrations and access various information, bypassing 2FA protection without being detected.

Comments

Popular posts from this blog

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Loca...

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has...

Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer

If you use VLC media player on your computer and haven't updated it recently, don't you even dare to play any untrusted, randomly downloaded video file on it. Doing so could allow hackers to remotely take full control over your computer system. That's because VLC media player software versions prior to 3.0.7 contain  two high-risk security vulnerabilities , besides many other medium- and low-severity security flaws, that could potentially lead to arbitrary code execution attacks. With more than 3 billion downloads, VLC is a hugely popular open-source media player software that is currently being used by hundreds of millions of users worldwide on all major platforms, including Windows, macOS, Linux, as well as Android and iOS mobile platforms. Discovered by Symeon Paraschoudis from Pen Test Partners and identified as  CVE-2019-12874 , the first high-severity vulnerability is a double-free issue which resides in "zlib_decompress_extra" function of VideoLAN VLC ...