Share Blog post
- Germany’s Federal Office for Information Security in collaboration with the Federal Criminal Police Officer has issued a joint statement on how to deal with a ransom demand following a ransomware attack. In addition to this, the agency has also provided a detailed guide to the local governments and municipal institutions on how to deal with ransomware attacks.
- More than 850,000 websites that run outdated TLS 1.0 and 1.1 protocols are scheduled to be removed from most major browsers later this month. These communication protocols use weak cryptographic algorithms and are vulnerable to a series of cryptographic attacks.
- The Cyber Security Agency of Singapore (CSA) has planned to launch a new Cybersecurity Labelling Scheme (CLS) to improve the security of IoT products against cyberattacks. The scheme is part of the country’s new Safer Cyberspace and will initially include Wi-Fi routers and smart home hubs.
- The UK’s National Cyber Security Center (NCSC) has released a set of guidelines to boost the security of smart security cameras and baby monitoring devices. The new guidance has been issued to help users in protecting their devices from being compromised.
- An American university has launched a unique toolkit called FileTSAR to help law enforcement agencies catch cybercriminals. It can also be used to detect staff who acted as insider threats.
- The FCC has proposed fines of more than $200 million against four wireless carriers - T-Mobile, AT&T, Verizon, and Sprint - for improperly selling access to their customers’ location data. The carriers had apparently allowed outside companies to capture the location of wireless devices without their owners’ knowledge or consent.
- An unsecured database hosted on Google Cloud had exposed more than 200 million records related to US residents. The exposed data included a victim’s name, address, email address, age, gender, ethnicity, employment, credit rating, and property information.
- The wireless carrier T-Mobile came under fire again for unavailable to protect users’ information after a security breach. The possible leaked data includes names, addresses, phone numbers, account numbers, rate plans, and billing information of users.
- Walgreens, the second-largest pharmacy store in the U.S, disclosed that its official mobile app contained a bug that exposed the personal details of some of its users. The exposed data included names, prescription details store numbers and shipping addresses of users.
- A database containing personal information of Australian Defence Force (ADF) personnel was taken offline last month following a cybersecurity incident. The Defence Department acknowledged the incident to be a ‘potential security concern’ but suggested that there was no evidence of data being stolen.
- A ransomware attack at Simon Fraser University had affected the personal details of some employees and students. The university revealed that the incident affected the data of those individuals who joined the university prior to June 20, 2019.
- Legal services giant Epiq Global was also a victim of a ransomware attack. Sources claim that the ransomware had hit the organization’s entire fleet of computers across its 80 global offices.
- Two units of cruise operator Carnival Corp - Holland America Line and Princess Cruises - disclosed that they were targeted in a cyberattack last year. The attack had led to the compromise of personal data of some guests and employees.
- A potential data breach at Tesco had forced the firm to reissue 620,000 new Clubcard numbers. The retailer believes that a database of stolen username and password combinations was tested on its website to gain access to their customers’ accounts.
- An unsecured Amazon web service bucket had exposed the email address and travel details of about 10,000 people who used the free wi-fi service at UK railway stations. The affected railway stations included Harlow Mill, Chelmsford, Colchester, Wickford, Waltham Cross, Norwich and London Bridge.
- Two casinos’ websites along with computer networks owned by the company TLC Casino Enterprise Inc. were out of order for almost a week due to a ransomware attack on February 27. The incident had also affected slot machines, player loyalty programs, credit card processing, hotel reservations, and ATMs at two casinos.
- Virgin Media reported a breach that occurred due to a misconfigured database. The leaky database contained personal information of about 900,000 customers.
- Steelmaker Evraz in North America was forced to shut down its IT systems following a cyberattack. The company confirmed was no indication of compromise of any confidential data.
- North Korean APT group Kimsuky was found using new malware implants to conduct a cyberespionage campaign. The group leveraged a shorter attack chain that involved the use of a ‘.scr’ extension file in order to bypass AV detection.
- Researchers detected a malicious Chrome extension named Ledger Live that is targeting the owners of Ledger cryptocurrency wallets. The extension, which is still available through the official Chrome Web Store, allows attackers to gain access to users’ accounts and steal their funds.
- Thirty vulnerabilities discovered in the file upload mechanisms of open-source web apps, CMSes and forums could be abused to plant malicious files on a victim’s servers. These vulnerabilities were uncovered using a FUSE, a new automated penetration testing toolkit.
- A new version of MTK-su rootkit that can be used to exploit a vulnerability CVE-2020-0069 was detected this week. The rootkit can be used against various models from Alcatel, Amazon, ASUS, Blackview, Huawei, LG, Meizu, Nokia, Motorola, OPPO, Sony, Realme, Xiaomi, and ZTE. The flaw exists in all of MediaTek’s 64-bit chips.
- Ransomware operators continued to dominate the threat landscape with their newly adopted ‘naming-and-shaming’ technique. This week, the authors of Nemty ransomware launched a website to disclose the data and files of victims that refused to pay ransoms. Apart from this, there was also a discovery of a new ransomware called PwndLocker targeting the US businesses and local government with ransom demands over $650,000.
- A MalBus attack that involved the use of four popular Korean-language transit apps were compromised to target military and political data. These applications, all related to bus information, were available for more than five years on the Google Play Store.
- Cybercriminals were found using fake security certificate update requests to infect potential victims with a Mokes backdoor and a Buerak trojan. These fake certificate requests were available on compromised websites.
- New encryption flaws found in Toyota, Hyundai and Kia’s chip-enabled mechanical keys can allow hackers to clone similar keys and steal the cars. Some affected models are Toyota Camry, Corolla, and RAV4; the Kia Optima, Soul, and Rio; and the Hyundai I10, I20, and I40.
Posted on: March 06, 2020
Get the Weekly Threat Briefing delivered to your email!
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.