Tampere university / Information Technology and Communication Sciences
Cyber security 1 /

Cyber security news from group 1   (28.8.-5.10.2020)

These are mainly very good, and interesting,
but you could try to make you contributions slightly
more condensed, using more of your own words.

V = Vulnerability, A = Attack, Accident, C = Culprit, Consequences (Costs, Convictions), I = Improvement, O = Other,

G = General purpose (Eng), S = Security special (Eng), g = General purpose (local), s = Security special (local), O=Other.

Day Writer    News
CategorySource

6.10.
-1
LoveHalf of all organizations experienced security incidents associated with remote working during the lockdown period. Phishing has remained the most prevalent threat remotely working employees face, responsible for almost half of all the security incidents. Remote working has also exposed businesses to insider threats. A remote employee was more likely to use an infected personal device or share sensitive data with personal accounts while working from home.
V-SCPO Magazine | Half of All Organizations Experienced Cyber Security Incidents During the Remote Working Period | Alicia Hope | https://www.cpomagazine.com/cyber-security/half-of-all-organizations-experienced-cyber-security-incidents-during-the-remote-working-period/
4.10.
-1
LoveA hacker group has been stealing sensitive documents from several governments in Eastern Europe and the Balkans since 2011, and gone largely undetected. The group mainly seems to use spearphishing emails in order to compromise their targets. Some contain an attachment while others contain a link to a malicious file. The first layer of the malicious file or attachment is generally a ZIP or RAR archive. When the victim double-clicks the link, a script is downloaded that installs the main malware component.
A-GUnian| Hacker group stealing gov't secrets, ESET security experts say | anonymous | https://www.unian.info/world/cyber-security-hacker-group-uncovered-stealing-gov-t-secrets-11168957.html
3.10.phanlanPort 60001 is a common port used by IoT devices, most notably the Defeway cameras, which make up over 90% of all cameras using this port. These cameras are being installed within networks with no password protection. "While the users feel they are simply giving themselves access to view their camera from anywhere, it is actually giving attackers the ability to install botnets, such as Mirai, on the device," said Juniper's Jesse Lands.
V-SInfo Security Group | Spawn of Demonbot Attacks IoT Devices | Sarah Coble | Source :: https://www.infosecurity-magazine.com/news/spawn-of-demonbot-attacks-iot/?&web_view=true
2.10.
-1
phanlanGoldman Sachs Group turned to its chief rival to fill its top cybersecurity job. Matthew Chung will be joining as chief information security officer and head of technology risk, according to a memo. Chung helped marshal Morgan Stanley’s technology defenses, and at Goldman will be filling a position held by an interim chief after the departure of Andy Ozment earlier this year.
O-GAmerican Banker | Goldman Sachs poaches cybersecurity head from Morgan Stanley | Bloomberg News | Source :: https://www.americanbanker.com/articles/goldman-sachs-poaches-cybersecurity-head-from-morgan-stanley?&web_view=true
30.9.
-1
phanlanThe House on Tuesday unanimously passed four bills aimed at securing the power grid and other energy infrastructure against cyberattacks. All four of the bipartisan bills were approved by voice vote, and supported by the leaders of the House Energy and Commerce and House Science, Space, and Technology panels.
I-GThe Hill | House passes bills to secure energy sector against cyberattacks| MAGGIE MILLER| https://thehill.com/policy/cybersecurity/518816-house-passes-bills-to-secure-energy-sector-against-cyberattacks?&web_view=true
30.9.LoveOne of the largest health care and hospital networks in the US has been hit by a cyber attack that is assumed to be a ransomware. The attack had shut down entire computer systems and closed off access to medical records and communication methods for hospitals across the nation. A ransomware is engineered to take over the system and ask for a ransom to restore the system. In the meantime the attacker has access to private and personal information.
A-GKXII | Cyber attack hits TMC: Cyber security expert explains | Nina Quatrino | https://www.kxii.com/2020/09/30/cyber-attack-hits-tmc-cyber-security-expert-explains/
29.9.
-1
phanlanPolice Scotland is to establish a “center of excellence” for cybercrime with specialist staff deployed to help combat online offences including child sexual abuse, fraud and the sharing of indecent images. As reported by the BBC, the center will have at least 150 specialist personnel, initially bringing together 100 officers and staff already working in cyber-criminality and a further 50 staff. The strategy will be put before the Scottish Police Authority board later this week.
I-GInfo Security | Police Scotland to Establish Center of Excellence to Tackle Cybercrime | Michael Hill | Source :: https://www.infosecurity-magazine.com/news/police-scotland-center-excellence/?&web_view=true
28.9.phanlanResearchers detected a critical RCE Instagram vulnerability that allows the threat actors to take control of your Instagram account by sending a simple images to the victim via email, WhatsApp or other media exchange platforms. When the victim opens the Instagram app, the exploitation takes place.
V-SCyber Security News | Instagram App Vulnerability Let Hackers to Take Control of Your Account Using Malformed Picture | Balaji N | Source :: https://cybersecuritynews.com/critical-instagram-vulnerability/
27.9.
-1
phanlanSome Hungarian banking and telecommunication services were briefly disrupted by a powerful cyber attack on Thursday launched from computer servers in Russia, China and Vietnam, telecoms firm Magyar Telekom MTEL.BU said on Saturday. The event was a distributed-denial-of-service (DDoS) attack, a cyber attack in which hackers attempt to flood a network with unusually high volumes of data traffic in order to paralyse it. The volume of data traffic in the attack was 10 times higher than the amount usually seen in DDoS events, the company said.
A-GReuters | Hungarian banks, telecoms services briefly hit by cyber attack: Magyar Telekom | Anonymous | Source :: https://www.reuters.com/article/us-hungary-cyber/hungarian-banks-telecoms-services-briefly-hit-by-cyber-attack-magyar-telekom-idUSKBN26H0CB?&web_view=true
26.9.
-1
phanlanOne of the biggest changes the company has implemented is to require all employees to use physical two-factor-authentication. Twitter had already started distributing physical security keys to its employees prior to the hack, but stepped up the program’s rollout. Within a few weeks, everyone at Twitter, including contractors, will have a security key and be required to use it.
I-GWired | How Twitter Survived Its Biggest Hack—and Plans to Stop the Next One | Nicholas Thompson, Brian Barrett| Source :: https://www.wired.com/story/inside-twitter-hack-election-plan/?&web_view=true
25.9.phanlanFacebook said it had removed three networks of fake accounts, believed to have been set up by Russian intelligence services to disrupt the upcoming US election. According to the representative of the world's largest social network, the suspended accounts used fake identities for the purpose of spreading hacked material and influencing the US election. These accounts are linked to Russian intelligence and an organization in St. Petersburg, which has been accused by US officials of interfering in the 2016 presidential election process [Vietnamese]
C-gvnexpress | Facebook xóa các tài khoản Nga định can thiệp bầu cử Mỹ | Minh Minh | source :: https://vnexpress.net/facebook-xoa-cac-tai-khoan-nga-dinh-can-thiep-bau-cu-my-4167235.html
24.9.
-1
phanlanThe COVID-19 surveillance tool built by the Uttar Pradesh state government has put data of approx. 8 million Indian citizens at risk. A research report from VPNmentor revealed that a COVID-19 surveillance tool dubbed Surveillance Platform Uttar Pradesh COVID-19 was compromised on August 1st, leading to a massive data breach. According to researchers, various vulnerabilities were exploited to compromise the surveillance platform, but the primary reason behind the breach was a severe lack of security.
V-SHackRead | India’s COVID-19 surveillance tool exposed millions of user data | Waqas | source :: https://www.hackread.com/india-covid-19-surveillance-tool-exposed-user-data/?web_view=true
23.9.
-1
phanlanA Peer-to-Peer (P2P) botnet named Mozi has been causing a considerable increase in overall IoT botnet activities since late 2019. Lately, IBM X-Force has released a report claiming the botnet has accounted for nearly 90% of the observed IoT network traffic from October 2019 through June 2020.
V-SCYWARE SOCIAL | Mozi Malware Amasses IoT Network Traffic Quietly | anonymous | source :: https://cyware.com/news/mozi-malware-amasses-iot-network-traffic-quietly-4def6ff8
21.9.phanlanThe vulnerability was originally discovered by Chris Moberly. The vulnerability resides in the Firefox browser's SSDP tool, which can be exploited to target Android devices connected to the same Wi-Fi network. The Firefox browser's SSDP tool can be tricked into activating an Android intent by replacing the location of the XML file in response packets with a message pointing to the intent URI on Android. From there, an attacker on the same Wi-Fi network can run a malicious SSDP server on the device trigger intent-based commands on nearby Android devices through Firefox without any victim’s interaction [Vietnamese]
V-swhitehat.vn | The Firefox vulnerability on Android allows attacks over Wi-Fi networks | Ginny Ha | Source :: https://whitehat.vn/threads/lo-hong-firefox-tren-android-cho-phep-tan-cong-qua-mang-wi-fi.14035/
21.9.phanlanO.MG looks like normal Lightning cable but inside is attached tracking chip, allowing hackers to attack and steal data remotely.O.MG has a similar design to the Lightning cable that was introduced last year at the Defcon Security Conference. When the iPhone was plugged into the target computer, O.MG began transmitting the signal to the remote host via radio waves. Thereby, a device about 100 meters away can control all operations, including stealing passwords. O.MG only really worked when plugged into the computer, now it can collect data when plugged in with the charger.[Vietnamese]
V-gvnexpress | Lighting cable pre-implanted tracking chip | Bảo Lâm | Source::https://vnexpress.net/cap-lighting-cay-san-chip-doc-hai-4164830.html
21.9.phanlanResearchers tested the effectiveness of the phishing training over time, with periodic tests at regular intervals, to determine when SOGSS employees would lose their ability to detect phishing emails. Employees were split into multiple groups and tested four, six, eight, ten, and twelve months, respectively, after receiving an on-site phishing training course. The research team found that while the survey takers were able to correctly identify phishing emails even after four months following the initial training, this was not the case after six months and beyond, with a new training being recommended.
I-SZDNet | Phishing awareness training wears off after a few months | Catalin Cimpanu | Source :: https://www.zdnet.com/article/phishing-awareness-training-wears-off-after-a-few-months/?&web_view=true
21.9.
-1
phanlanA group of hackers has leaked on Saturday the names and personal details of more than 1,000 high-ranking Belarusian police officers in response to violent police crackdowns against anti-government demonstrations. The leaked data included names, dates of birth, and the officers' departments and job titles. Details for 1,003 police officers were leaked via a Google spreadsheet, with most of the entries being for high-ranking officers, such as lieutenants, majors, and captains.
A-GZDNets | Hackers leak details of 1,000 high-ranking Belarus police officers | Catalin Cimpanu | Source :: https://www.zdnet.com/article/hackers-leak-details-of-1000-high-ranking-belarus-police-officers/?&web_view=true
21.9.
-1
phanlanMozi is an IoT botnet that borrows the code from Mirai variants and the Gafgyt malware, it appeared on the threat landscape in late 2019. The Mozi botnet was spotted by security experts from 360 Netlab, at the time of its discovered it was actively targeting Netgear, D-Link, and Huawei routers by probing for weak Telnet passwords to compromise them.
A-SSecurity Affairs| Mozi Botnet is responsible for most of the IoT Traffic | Pierluigi Paganini | Source :: https://securityaffairs.co/wordpress/108537/malware/mozi-botnet-iot-traffic.html?web_view=true
21.9.phanlanAccording to reports, more than 500,000 Activision accounts may have been hacked with login data being compromised. The eSports site Dexerto has reported that a data breach occurred on Sunday, September 20. The credentials to access these accounts are, Dexerto said, being leaked publicly, and account details changed to prevent easy recovery by the rightful owners. Activision accounts are mostly used by players of the hugely popular Call of Duty franchise.
V-GForbes | Activision Accounts Hacked? 500,000 Call Of Duty Players Could Be Affected—Report | Davey Winder | Soure :: https://www.forbes.com/sites/daveywinder/2020/09/21/activision-accounts-hacked-500000-call-of-duty-players-could-be-affected-report/?&web_view=true #20afc277bbe6
21.9.phanlanA newly-published index ranks Australia's cyber intent four spots higher than its actual cyber capability. Australia scored number eight out of 30 major nations for "cyber intent" in the National Cyber Power Index 2020 (NCPI) published earlier this month, but only number 16 for "cyber capability".
O-SZD.NET | Australia's cyber power is more bark than bite | Stilgherrian | Source :: https://www.zdnet.com/article/australias-cyber-power-is-more-bark-than-bite/?&web_view=true
21.9.phanlanNational Security Adviser (NSA) Ajit Doval on Friday said the Centre is coming up with National Cyber-Security Strategy 2020 which envisions a safe, secure, trusted, resilient and vibrant cyberspace for India's prosperity. He said that in India progress made through digital and e-governance has helped to ensure that "we would carry out the business of the government, economic activity and social interactions". However, malicious actors also found a new opportunity, he said.
I-SET CISO.IN | Centre coming up with National Cyber-Security Strategy 2020: NSA Doval | ANI | Source :: https://ciso.economictimes.indiatimes.com/news/centre-coming-up-with-national-cyber-security-strategy-2020-nsa-doval/78225856
18.9.
-1
louissonA patient has died after a ransomware attack on the Düsseldorf University Hospital. The hacker attack paralyzed large parts of the university clinic on Tuesday, which forced the patient, who needs immediate medical attention, to be rerouted to a hospital in Wuppertal (approx. 30km away) on Thursday. After being contacted by the police, the attackers handed the key required to break the encryption. The public prosecutor has started a murder investigation.[German]
C-sNetzBasti | Uniklinik Düsseldorf: Todesfall wegen eines Hacker-Angriffs? | Basti | https://netzbasti.de/2020/09/17/uniklinik-duesseldorf-todesfall-wegen-eines-hacker-angriffs/
17.9.louissonIn a media statement released today, related to the indictments of 2 of its Malaysian employees, Sea Gamer Mall said the 2 employees are on leave due to the investigation. This is not unexpected, since the two indicted were arrested by Malaysian police, following accusations from the US Department of Justice for conspiring with Chinese nationals to "profit from computer intrusion". Sea Gamer Mall also stated that they have not been involved in illegal activities, and that their users' data remains secure.[Malay]
C-gmalaysiakini | SEA Gamer Mall cutikan CEO, CPO lepas dituduh terlibat skandal godam | Diterbitkan Hari | https://www.malaysiakini.com/news/542991
16.9.louissonUS government has filed charges against 5 Chinese for hacking into more than 100 companies across the world in various different fields. These indicted hackers are part of a Chinese state-sponsored hacking group known as APT41. APT41 also compromised governmental networks in Vietnam & India, as well as attempted unsuccessfully to do the same with the UK government's.
C-SZDNet | US charges five hackers part of Chinese state-sponsored group APT41 | Catalin Cimpanu | https://www.zdnet.com/article/us-charges-five-hackers-part-of-chinese-state-sponsored-group-apt41/
16.9.
-1
MadhavPandemic forced the workforce to adopt remote working in day to day life wherein the businesses staring at a financial loss. Remote working though has created an enormous impact on the cybersecurity of Indian enterprises. If we go by reports, a Microsoft Executive stated a total of 9000 Corona virus themed attacks were detected in India from 2nd Feb to 2nd May. There arises a question, can work from home lessen the gap of cybersecurity skills ? For this, we need to lessen the gap between -- Inadequate funding by corporate , Cybersecurity training in educational institutions, and many other factors.
O-SName :: ET CISO || Title :: Can work-from-home bridge the gap of cybersecurity skills Author :: Shomiron Dasgupta, Link :: https://ciso.economictimes.indiatimes.com/news/can-work-from-home-bridge-the-gap-of-cybersecurity-skills/78125742
14.9.louissonEmma CakeCup, a YouTuber and influencer appeared in tears on Snapchat this Sunday, September 13, 2020, admitting to being a victim of blackmail for a few months, while an Internet user threatens to reveal some nude photos of her taken in photoshoots 2 years ago. The attacker demands 10,000 euros or else the photos will be disclosed. She also mentioned that legal proceedings are on the way.[French]
A-gPurebreak | Emma CakeCup en larmes : un hacker la menace de dévoiler des photos d'elle nue | Marion Poulle | https://www.purebreak.com/news/emma-cakecup-victime-de-chantage-un-hacker-la-menace-de-devoiler-des-photos-d-elle-nue/202286
13.9.
-1
louissonThe Russia-linked threat group known as APT28 has changed up its tactics to include Office 365 password-cracking and credential-harvesting. Microsoft researchers have tied APT28 (a.k.a. Strontium, Sofacy or Fancy Bear) to this newly uncovered pattern of O365 activity, which began in April and is ongoing. The attacks have been aimed mainly at U.S. and U.K. organizations directly involved in political elections.
A-Sthreat post | APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins | Tara Seals | https://threatpost.com/apt28-theft-office365-logins/159195/
11.9.
-1
louissonAlexander Feshchenko, charged with cyberfraud and hacking, will stand trial in Kovrov, a town in Russia’s Vladimir Region, for embezzling approx. $130,000 from three local enterprises through cyberattacks. Feshchenko, howver, was not acting alone - he conspired with others to distirbute malicious software to gain illegal access to local businesses' computers. Further unidentified people involved are being investigated.
C-GRAPSI | Alleged hacker to go on trial on $140K cyber fraud allegations | Anonymous | http://rapsinews.com/judicial_news/20200910/306257439.html
9.9.
-1
phanlanK-Electric, the sole electricity provider for Karachi, Pakistan, has suffered a Netwalker ransomware attack that led to the disruption of billing and online services. K-Electric is Pakistan's largest power supplier, serving 2.5 millions customers and employing over 10 thousand people. Starting yesterday, K-Electric customers have been unable to access the online services for their account.
A-SBLEEPINGCOMPUTER | Netwalker ransomware hits Pakistan's largest private power utility | Lawrence Abrams | Source :: https://www.bleepingcomputer.com/news/security/netwalker-ransomware-hits-pakistans-largest-private-power-utility/?&web_view=true
9.9.phanlanThe official leading the effort to protect U.S. elections from foreign hacking said on Tuesday he had seen no signs of infiltration on computer systems used to record and tabulate votes. “The technical stuff on networks, we’re not seeing,” said Chris Krebs, director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA). “It gives me a little bit of confidence.”
I-GReuter| Top U.S. federal election protection official says no sign of infrastructure hacks | Joseph Menn | Source :: https://www.reuters.com/article/us-election-cyber/top-u-s-federal-election-protection-official-says-no-sign-of-infrastructure-hacks-idUSKBN26002B?&web_view=true
9.9.
-1
phanlanBancoEstado, one of Chile's three biggest banks, was forced to shut down all branches on Monday following a ransomware attack that took place over the weekend.Investigators believe that on the night between Friday and Saturday, hackers used this backdoor to access the bank's network and install ransomware.
C-OZDNet| Chilean bank shuts down all branches following ransomware attack| Catalin Cimpanu | Source :: https://www.zdnet.com/article/chilean-bank-shuts-down-all-branches-following-ransomware-attack/?&web_view=true
9.9.louissonMalwarebytes has found up to 4 different adwares inside a mobile phone sponsored by Lifeline - a program by the US government to supply low-income people with mobile phones & cellular data connection. When connected to the interenet, advertisements will immediately appear on the device continually, rendering it unusable. The device was manufactured by a Chinese firm named Unimax, and its supplier is US-based Assurance Wireless. Both have yet to comment.[Vietnamese]
V-gVnExpress | Smartphone cho người thu nhập thấp bị cài sẵn mã độc | Bảo Lâm | https://vnexpress.net/smartphone-cho-nguoi-thu-nhap-thap-bi-cai-san-ma-doc-4158759.html
8.9.
-1
MadhavAs per the 2Q 2020 reports been published :: More than 143 million malware targeted consumer smart-devices that too mainly in the form of coronavirus-themed attacks. In the month of June, highest detections were recorded for Windows malware with 1.5 million daily detections due to the opening up of businesses under the unlock phase. Malware clocked 38 per cent of the total Android detections in Q2. Wherein, Android.Bruad.A has topped the list of top 10 Android malware with 32 per cent detections.
V-SSource :: ET CISO || Title :: 143mn Windows malware hit consumer smart devices in Q2: Report Author :: Anonymous, Link :: https://ciso.economictimes.indiatimes.com/news/143mn-windows-malware-hit-consumer-smart-devices-in-q2-report/77995908
8.9.
-1
louissonFacing the rise of ransomware targeted at several large corporations, the French National Cybersecurity Agency (ANSSI) has therefore decided to publish a new guide for businesses and communities wishing to protect themselves against these attacks. Interventions directly from ANSSI were also made during recent years: 69 incidents in 2019 and up to 104 incidents so far in 2020.[French]
I-sZDNet | Ransomware : les interventions de l'Anssi ont presque doublé | Louis Adam | https://www.zdnet.fr/actualites/ransomware-les-interventions-de-l-anssi-ont-presque-double-39909157.htm
7.9.louissonEvilnum - the notorious hackers organization targeting fintech orginazation has modified their strategy, developing a Remote Access Trojan (RAT), written in Python, with the purpose to steal passwords, documents, browsing cookies and other sensitive information. A RAT allows a backdoor to the target system, enabling adminstrative access control remotely for the attacker. [Vietnamese]
V-sSecurityDaily | Mã độc RAT mới tấn công các công ty tài chính | Ha Nguyen | https://securitydaily.net/ma-doc-rat-moi-tan-cong-cac-cong-ty-tai-chinh/
7.9.
-1
phanlanNewcastle University has been hit by a cyber attack which is expected to take "a number of weeks" to sort out. It comes after a recent hack on Northumbria University, which affected exams and its clearing hotline. The issue has been reported to the Information Commissioner's Office and police after the IT problem came to light a week ago
A-GBBC News | Newcastle University cyber attack 'to take weeks to fix'| anonymous | source :: https://www.bbc.com/news/uk-england-tyne-54047179?intlink_from_url=https://www.bbc.com/news/topics/cp3mvpdp1r2t/cyber-attacks&link_location=live-reporting-story
7.9.MadhavToday,an Israeli chip manufacturer organization named "Tower Semiconductor" conveyed in a statement that few of its systems were hit by a cyber attack and due to that it was putting on hold some servers and manufacturing operations. Though the company has notified the corresponding authorities and they are working parallel with law enforcement organizations in order to recover from the impacted systems. Currently,there is no assessment as to what is the actual effect on the company of this attack.
V-SSource Name :: ET CISO.in || Title :: Israel's Tower Semi halts some operations after cyber attack Author :: Reuters. Web Link :: https://ciso.economictimes.indiatimes.com/news/israels-tower-semi-halts-some-operations-after-cyber-attack/77968778
6.9.
-1
louissonCOVID-19 has put significantly more strain on the cybersecurity industry, which has been facing a talent shortage prior to the pandemic. As remote work is becoming the norm, some cyber professionals were re-assigned to other tasks, including IT support, even though cybersecurity attacks related to COVID-19 are on the rise. Nearly 500,000 workers are now needed in cybersecurity roles around the USA.
V-GCNBC | ‘We are outnumbered’ — cybersecurity pros face a huge staffing shortage as attacks surge during the pandemic | Kate Rogers, Betsy Spring | https://www.cnbc.com/2020/09/05/cyber-security-workers-in-demand.html
5.9.
-1
phanlanA strain of ransomware designed to disrupt computers’ booting processes hit government-run organizations in the Middle East and North Africa in July, researchers said Friday, in the latest example of data-wiping tools being aimed at key organizations in the region. The ransomware attacks used Thanos, a type of malware that surfaced earlier this year and has gained traction on underground forums Whether hackers really wanted the “20,000$” they asked for in a note left on the machines is unclear. The MBR overwrite didn’t end up working because of a coding error. It’s unclear if the victims paid the ransom.
A-SCyberscoop | Ransomware hits two state-run organizations in the Middle East and North Africa| Sean Lyngaas |source:: https://www.cyberscoop.com/ransomware-thanos-middle-east-palo-alto_networks/
5.9.
-1
phanlanA phishing campaign deployed recently at various businesses uses the company's home page to disguise the attack and trick potential victims into providing login credentials,loads the legitimate page of the business and applies a fake login box on top of it. The attack starts with an email purporting to be from the company technical support team informing that some messages were blocked from reaching the inbox because they were quarantined. To create a sense of urgency, the message from the attacker states that the emails are scheduled for deletion unless the recipient reviews , takes action to recover them.
A-GBleeping Computer | Phishing adds overlay on official company page to steal logins | author :: Ionut Ilascu | source::https://www.bleepingcomputer.com/news/security/phishing-adds-overlay-on-official-company-page-to-steal-logins/?&web_view=true
4.9.louissonWarner Music recently announced on Friday that it has been hit by a Magecart-type attack for many months. The number of attack victims is still being counted. A Magecart-attack occurs when attackers insert malicious codes into websites in order to obtain customer information, which usually includes payment details.[French]
A-sZDNet.fr | Warner Music touché par une attaque de type Magecart | Catalin Cimpanu | https://www.zdnet.fr/actualites/warner-music-touche-par-une-attaque-de-type-magecart-39909059.htm
4.9.
-1
Madhav Various researches from university of Pardubice, Czech Republic and IIT Guwahati have teamed up to develop an algorithm which will encrypt the healthcare sensitive information and protects digital data from various cyber attacks. The cryptography based algorithm and soft IPs can be integrated to System-on-Chip (S-O-C) for protecting nation’s digital data and citizen information. These data will be fully secured using an unbreakable lock- and – key. The research has also been widely published in IEEE International Conference.
I-GSource :: Times of India || Title :: https://timesofindia.indiatimes.com/city/guwahati/iit-guwahati-team-develops-cyber-attack-shield/articleshow/77908709.cms Author ::Kangkan Kalita || Link :: https://timesofindia.indiatimes.com/city/guwahati/iit-guwahati-team-develops-cyber-attack-shield/articleshow/77908709.cms
3.9.louissonMicrosoft released Microsoft Video Authenticator, a tool which can analyze videos or images and return the percentage of it being a deepfake. A deepfake uses AI to study real humans' facial properties and then modifies and/or produces images/videos of a person that does not exist in real life. Deepfake is also able to produce footage of a real-life person saying things they never actually did in real life. Microsoft admits that their technology is still lagging behind that of deepfake, but more powerful algorithms are on their way.[Vietnamese]
I-gVnExpress | Microsoft releases deepfake detection tool | Bảo Lâm | https://vnexpress.net/microsoft-ra-cong-cu-phat-hien-deepfake-4156193.html
3.9.MadhavIndian Prime Minister Narendra Modi’s personal accounts on twitter was hacked today. Twitter has confirmed on this news. Further to this, Twitter said in an official statement they are taking various steps to secure on the PM Modi’s compromised account. Though Twitter is actively further inverstigating on the issue. The compromised account has about 2.5 million followers. Further, the hackers have sent out various tweets through PM Modi’s account asking the followers to donate to the PM National Relief Fund through cryptocurrency.
A-GName :: The Print || Title :: PM Narendra Modi’s Twitter account linked to personal website hacked Author :: Anonymous, Link :: https://theprint.in/india/pm-narendra-modis-twitter-account-linked-to-personal-website-hacked/494655/
2.9.louissonSix applications were removed from Google Play Store due to infection with the Joker malware. The apps, most of which show red flags of being developed with malicious intents, accounted for roughly 200,000 installs. Apps embedded Joker malware are programmed to load and execute external code after being published on the store. The Joker malware emerged in 2017 but since 2019 has appeared more frequently.
V-Sthreatpost | Joker Spyware Plagues More Google Play Apps | Lindsey O'Donnell | https://threatpost.com/joker-spyware-google-play-apps-2/158895/
1.9.LoveA new phishing campaign takes advantage of HTML complexity by inserting invisible font into embedded the code, also known as zero font. By using yellow text set to zero, a hacker can hide malicious emails from a mail protection software.
V-Shttps://healthitsecurity.com | Report: Phishing Campaign Uses Hidden Text to Bypass Email Security | Jessica Davis | https://healthitsecurity.com/news/report-phishing-campaign-uses-hidden-text-to-bypass-email-security
1.9.
-1
phanlanNgo Minh Hieu (1989) known as Hieupc or Traztaz659, an international student at Unitec Institute of Technology in Auckland.Hieupc has used computers in Vietnam to hack into many systems and steal about 200 million social security card numbers, information about bank accounts, credit cards, names, addresses, phone numbers, birthdays… of millions of American citizens and sell it back to cybercriminal groups with great money deals! On July 14, 2015, Judge Paul J. Barbadoro sentenced Hieupc to 13 years in prison! He was released from the US prison at the end of August 2020 and deported back home.[Vietnamese]
C-gsite: Facebook| Author: Lê Nguyễn Hương Trà | Source : https://www.facebook.com/lenguyenhuongtra.de/posts/10214739024983942
1.9.FrozenPotatoNorways parlament and grand district court is under a large cyber attack. Emails of some of the congressmen and grand district courts staff have been compromised. Norways security police is aware of the incident and currently planning to investigate. [Finnish]
A-gyle.fi | Norjan parlamenttiin on tehty laajamittainen kyberhyökkäys | Heikki Heiskanen | https://yle.fi/uutiset/3-11522222
1.9.louissonKnown to be one of the "cybercrime hotbeds" in recent years, especially in 2016 - when the contry hosts the Olympics, Brazil has since made significance improvements in terms of cybersecurity, from awareness, legislations to standards and technologies. This is the outcome of an evaluation by The Organization of American States (OAS) and the University of Oxford's cyber security centre, working closely with Brazillian authorities to assess the country's preparedness.
I-SThe Daily Swig | Brazil reaches towards cybersecurity maturity | Emma Woollacott | https://portswigger.net/daily-swig/brazil-reaches-towards-cybersecurity-maturity
31.8.
-1
louissonCybersecurity schools of 2 of the top Chinese universities: Wuhan University and Huazhong University of Science and Technology will share resources on a same, new campus. This movement will help boost the industralization of scientific research on cybersecurity, in order for China to become a strong cyberpower and be able to produce world-class cybersecurity professionals.
I-GGlobal Times | Chinese universities share resources to boost R&D capacity of cyber security | anonymous | https://www.globaltimes.cn/content/1199340.shtml
30.8.
-1
MadhavCyber risks are everywhere which makes cybersecurity is inescapable and essential ingredient to country success. Every country is struggling to make cybersecurity a vibrant, proactive part of strategy, operations, and culture. To make this a reality, India should work towards updating cybersecurity policies and include Threat Retaliation Strategy, SOS Lockdown Policy, 5G & IOT Devices Security Framework, Nationwide Training, Security Standard Enforcement in their policies. The implementation of cybersecurity polices thoughtfully can reduce cyber risk significantly. Consequently, India will not only in good position to enhance data security of citizens but also encourage other nations to invest and expand.
I-GSource - World is One, WION || Site Name :: https://www.wionews.com/ News Source :: https://www.wionews.com/opinions-blogs/5-essential-points-that-should-make-it-to-indias-new-cyber-security-policy-323747 Author :: Shikhil Sharma
30.8.
-1
louissonThe New Zealand Stock Exchange (NZX) suffered a DDoS attack on Tuesday this week and experienced similar attacks since. The attacks are associated with a "criminal gang" offshore, which targeted many of the world largest financial service providers. NZX is working with its service provider and cybersecurity partners to address these attacks.
A-GZDNet | New Zealand Stock Exchange suffers day four disruption following DDoS attacks | Asha Barbaschow | https://www.zdnet.com/article/new-zealand-stock-exchange-suffers-day-four-disruption-following-ddos-attacks/
29.8.phanlanBluezone is known as an alert support software if we had close contact with a suspected Covid-19 in a period of 14 days. This application uses Bluetooth BLE technology, so your contact data does not include location. Contact history data is only saved and secure on your device. Contact history data is used only by health authorities in case that you are a suspected. With the change of ID generation mechanism, Bluezone application no longer uses a unique ID, but automatically changes the ID every few minutes.The Bluezone developers have published app’s source code[Vietnamese]
I-sWhite Hat | Does Bluezone collect user data? | anonymous | source : https://whitehat.vn/threads/bluezone-co-thu-thap-du-lieu-nguoi-dung-khong.13969/
29.8.
-1
FrozenPotatoThe operators behind the "Lemon Duck" cryptominer have developed new techniques to better target enterprise-grade Linux systems, according to the security firm Sophos. The gang that developed the malware, which mines for monero cryptocurrency, also is now deploying new obfuscation techniques to avoid detection, Sophos says. Plus, the malware is "fileless" and will leave no trace on the network once its activities are complete. The malware uses the infected computer to replicate itself in a network and then uses the contacts from the victim's Microsoft Outlook account to send additional spam emails to more potential victims, the report notes.
V-Sgovinfosecurity.com | 'Lemon Duck' Cryptominer Aims for Linux Systems | Chinmay Rautmare (@crautmare) | https://www.govinfosecurity.com/lemon-duck-cryptominer-aims-for-linux-systems-a-14909?&web_view=true
28.8.phanlanAn Iranian cyberespionage group is now impersonating journalists to approach targets via LinkedIn and WhatsApp and infect their devices with malware. After a short conversation with the target, the Charming Kitten attacker requests to move the conversation to WhatsApp. If the target refuses to move to WhatsApp, the attacker will send a message via a fake LinkedIn profile." Other way is they took the step of messaging and calling a victim to gain the target's trust and subsequently walk the person through the steps of connecting to the webinar using the malicious link earlier shared in the chat.
V-SThe Hacker News | Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware | Ravie Lakshmanan | available : https://thehackernews.com/2020/08/hackers-journalist-malware.html?fbclid=IwAR06rsDtuLstgTyfCYfWjEfdwek2p5vVlH57R7vSEw6fU69mFdcl8aXHzOM