Go to listing page

Cyware Daily Threat Intelligence, June 08, 2021

Cyware Daily Threat Intelligence, June 08, 2021

Share Blog Post

The June 2021 Patch Tuesday is here with Google being one of the first few vendors to release security updates for more than 50 vulnerabilities in the Android operating system. More than half of the patched flaws affect Framework System, Kernel, MediaTek, and Qualcomm components.

While organizations keenly await security updates from Microsoft, it was revealed that the tech giant will also be rolling out a patch for a Use-After-Free (UAF) vulnerability found in the Office suite. The flaw can be exploited by sending a specially crafted file to users.

In other news, a new malware that uses Steam profile images to evade security checks has been spotted by researchers.

Top Breaches Reported in the Last 24 Hours

RockYou2021 leaks passwords
Around 8.4 billion entries of passwords have been leaked on a popular hacker forum. The compilation, which comprises a 100GB TXT file and goes by the name RockYou2021, was stored in plain text.

Navistar discloses data breach
Navistar International Corporation has disclosed a data breach after unknown attackers stole data from its network following a cybersecurity incident on May 20. Upon learning about the attack, the company launched an investigation and undertook immediate actions to mitigate the potential impact.

Top Malware Reported in the Last 24 Hours

New SteamHide malware
A newly discovered SteamHide malware has been found using Steam profile images to evade security checks. The malware is currently in the development stage.

Top Vulnerabilities Reported in the Last 24 Hours

Google’s June security updates
Google has issued security updates for over 50 vulnerabilities affecting its Android operating system, as part of June 2021 Security Updates. 27 of these flaws are found in Framework System, Kernel, MediaTek, and Qualcomm components. The most severe of these flaws is tracked as CVE-2021-0507 and can be exploited using specially crafted messages.  

Vulnerable Hyperkitty
Hyperkitty, a web interface for the popular open source mailing list and newsletter management service Mailman, has patched a critical bug that could expose private data. The bug was rated 7.5 on the CVSS severity scale.

WAGO Controller flaws
Several vulnerabilities discovered in industrial controllers made by WAGO can be exploited to disrupt technological processes. One of these flaws, tracked as CVE-2021-21001, is described as a path traversal issue related to a CODESYS component. It can allow attackers to access the file system with elevated privileges by sending specially crafted packets.

Unpatched flaw
One out of four flaws recently discovered in the Microsoft Office Suite, including Excel and Office, remains unpatched and can be abused by bad actors to deliver exploit code via Word and Excel documents. The flaw in question, CVE-2021-31939, is expected to be patched in June’s security update.

Faulty Fedena software
A pool of seven zero-day vulnerabilities discovered in Fedena can potentially lead to remote code execution. This includes two critical flaws that do not require authentication. The other five flaws are related to SQL injection, broken access controls, and cross-site scripting issues. The developers have suggested some workarounds to mitigate these flaws.

Top Scams Reported in the Last 24 Hours

Spamming to spread malware
Spammers are leveraging online casino websites, such as Ducky Luck, Raging Bull Casino, and Sports and Casino, to send deceptive emails to users in an attempt to spread malware. The specially- crafted emails include unique URLs containing an affiliate’s ID and cookies. These emails lure the victims into believing that they have won the ‘Grand Prize’ and will receive the amount only after they confirm their account.


use after free vulnerability
qualcomm component
fedena software
steam profile images

Posted on: June 08, 2021

More from Cyware

Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.