This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact productinfo[at]silobreaker[dot]com for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
Avaddon Ransomware 6 7
Water Nue 5 10
AgentTesla Keylogger 5 7
LockBit Ransomware 4 16
CryptoLocker 3 3
GuLoader 3 7
Kaiji Malware 2 2
XOR.DDoS 2 2
Android.HiddenAds 2 2
Stantinko Malware 2 7
Data Breaches
SecurityWeek – ‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://t.co/CPTRDI3ZU5
SecurityWeek – TwitterAug 10 2020 18:53
'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://www.securityweek.com/find-my-mobile-vulnerabilities-exposed-samsung-galaxy-phones-attacks
SecurityWeek – ‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://t.co/CPTRDIlALD
SecurityWeek – TwitterAug 11 2020 02:40
'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://www.securityweek.com/find-my-mobile-vulnerabilities-exposed-samsung-galaxy-phones-attacks
‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks
SecurityWeek RSS FeedAug 10 2020 18:53
A series of vulnerabilities affecting Samsung’s Find My Mobile could have been chained to perform various types of activities on a compromised smartphone, a researcher from Portugal-based cybersecurity services provider Char49 …
SecurityWeek – RT @SecurityWeek: ‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://t.co/CPTRDIlALD
SecurityWeek – TwitterAug 11 2020 03:41
RT @SecurityWeek: 'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://www.securityweek.com/find-my-mobile-vulnerabilities-exposed-samsung-galaxy-phones-attacks
Hacker Groups
CryptoCore Group
Vyagers – RSSAug 10 2020 13:43
CryptoCore Group
Treadstone71LLC – Prince of Hacking – by Lab Dookhtegan – Donations Accepted https://t.co/RAJlR7d3Ot
Treadstone71LLC – TwitterAug 10 2020 22:11
Prince of Hacking – by Lab Dookhtegan – Donations Accepted https://cybershafarat.com/2020/08/10/prince-of-hacking-by-lab-dookhtegan-donations-accepted/
da_667 – and while the lessons here are now almost 8 years old and featuring lulzsec and cabin crew, the same lessons still… https://t.co/XeAEwZfW6r
da_667 – TwitterAug 11 2020 03:39
and while the lessons here are now almost 8 years old and featuring lulzsec and cabin crew, the same lessons still remain: shut the fuck up, and keep shutting the fuck up. Especially on the internet. Tor isn't going to save you, and nobody is going…
virusbtn – Trend Micro researchers analyse the ‘Water Nue’ BEC campaign that targets Office 365 accounts… https://t.co/9KxNk0vjs2
virusbtn – TwitterAug 10 2020 08:21
Trend Micro researchers analyse the 'Water Nue' BEC campaign that targets Office 365 accounts https://blog.trendmicro.com/trendlabs-security-intelligence/water-nue-campaign-targets-c-suites-office-365-accounts/…
Malware
2020-08-10 – Emotet infection with Qakbot
Malware-Traffic-Analysis.net – Blog EntriesAug 10 2020 22:32
BleepinComputer – Updated list of ransomware data leak sites to include Avaddon ransomware.
https://t.co/P8Goss5Ouo
BleepinComputer – TwitterAug 10 2020 18:48
Updated list of ransomware data leak sites to include Avaddon ransomware.
https://www.bleepingcomputer.com/news/security/list-of-ransomware-that-leaks-victims-stolen-files-if-not-paid/
da_667 – Then, infosec people pointed out that it just becomes a layer of obfuscation for all kinds of background noise and… https://t.co/eOvDln8xNS
da_667 – TwitterAug 11 2020 03:39
Then, infosec people pointed out that it just becomes a layer of obfuscation for all kinds of background noise and shit being blasted across the internet. See also most ransomware pay sites, onionduke, torsocks, and every fucking thing else in…
virusbtn – ESET researchers release a set of scripts to deobfuscate the Stantinko malware, that can be used for other malware… https://t.co/mWHjjaLIn2
virusbtn – TwitterAug 10 2020 11:09
ESET researchers release a set of scripts to deobfuscate the Stantinko malware, that can be used for other malware too https://www.welivesecurity.com/2020/08/07/stadeo-deobfuscating-stantinko-and-more/…
Vulnerabilities
CVEnew – CVE-2020-6070 An exploitable code execution vulnerability exists in the file system checking functionality of fsck.… https://t.co/XxQjRN9j6S
CVEnew – TwitterAug 10 2020 14:45
CVE-2020-6070 An exploitable code execution vulnerability exists in the file system checking functionality of fsck.f2fs 1.12.0. A specially crafted f2fs file can cause a logic flaw and out-of-bounds heap operations, resulting in code execution. An…
Critical ManageEngine ADSelfService Plus RCE flaw patched
Help Net Security – NewsAug 10 2020 09:15
A critical vulnerability (CVE-2020-11552) in ManageEngine ADSelfService Plus, an Active Directory password-reset solution, could allow attackers to remotely execute commands with system level privileges on the target Windows host. About…
CVEnew – CVE-2020-15651 A unicode RTL order character in the downloaded file name can be used to change the file’s name duri… https://t.co/14gwYmPNcX
CVEnew – TwitterAug 10 2020 18:45
CVE-2020-15651 A unicode RTL order character in the downloaded file name can be used to change the file's name during the download UI flow to change the file extension. This vulnerability affects Firefox for iOS < 28….
TeamViewer Flaw in Windows App Allows Password-Cracking
Threatpost.comAug 10 2020 15:56
Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.
Ongoing Campaigns
DDoS attacks in Q2 2020
SecurelistAug 10 2020 10:02
News overview Not just one but two new DDoS amplification methods were discovered last quarter. In mid-May, Israeli researchers reported a new DNS server vulnerability that lurks in the DNS delegation process. The vulnerability exploitation scheme was…

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact productinfo[at]silobreaker[dot]com for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
Avaddon Ransomware 6 7
Water Nue 5 10
AgentTesla Keylogger 5 7
LockBit Ransomware 4 16
CryptoLocker 3 3
GuLoader 3 7
Kaiji Malware 2 2
XOR.DDoS 2 2
Android.HiddenAds 2 2
Stantinko Malware 2 7
Data Breaches
SecurityWeek – ‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://t.co/CPTRDI3ZU5
SecurityWeek – TwitterAug 10 2020 18:53
'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://www.securityweek.com/find-my-mobile-vulnerabilities-exposed-samsung-galaxy-phones-attacks
SecurityWeek – ‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://t.co/CPTRDIlALD
SecurityWeek – TwitterAug 11 2020 02:40
'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://www.securityweek.com/find-my-mobile-vulnerabilities-exposed-samsung-galaxy-phones-attacks
‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks
SecurityWeek RSS FeedAug 10 2020 18:53
A series of vulnerabilities affecting Samsung’s Find My Mobile could have been chained to perform various types of activities on a compromised smartphone, a researcher from Portugal-based cybersecurity services provider Char49 …
SecurityWeek – RT @SecurityWeek: ‘Find My Mobile’ Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://t.co/CPTRDIlALD
SecurityWeek – TwitterAug 11 2020 03:41
RT @SecurityWeek: 'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks https://www.securityweek.com/find-my-mobile-vulnerabilities-exposed-samsung-galaxy-phones-attacks
Hacker Groups
CryptoCore Group
Vyagers – RSSAug 10 2020 13:43
CryptoCore Group
Treadstone71LLC – Prince of Hacking – by Lab Dookhtegan – Donations Accepted https://t.co/RAJlR7d3Ot
Treadstone71LLC – TwitterAug 10 2020 22:11
Prince of Hacking – by Lab Dookhtegan – Donations Accepted https://cybershafarat.com/2020/08/10/prince-of-hacking-by-lab-dookhtegan-donations-accepted/
da_667 – and while the lessons here are now almost 8 years old and featuring lulzsec and cabin crew, the same lessons still… https://t.co/XeAEwZfW6r
da_667 – TwitterAug 11 2020 03:39
and while the lessons here are now almost 8 years old and featuring lulzsec and cabin crew, the same lessons still remain: shut the fuck up, and keep shutting the fuck up. Especially on the internet. Tor isn't going to save you, and nobody is going…
virusbtn – Trend Micro researchers analyse the ‘Water Nue’ BEC campaign that targets Office 365 accounts… https://t.co/9KxNk0vjs2
virusbtn – TwitterAug 10 2020 08:21
Trend Micro researchers analyse the 'Water Nue' BEC campaign that targets Office 365 accounts https://blog.trendmicro.com/trendlabs-security-intelligence/water-nue-campaign-targets-c-suites-office-365-accounts/…
Malware
2020-08-10 – Emotet infection with Qakbot
Malware-Traffic-Analysis.net – Blog EntriesAug 10 2020 22:32
BleepinComputer – Updated list of ransomware data leak sites to include Avaddon ransomware.
https://t.co/P8Goss5Ouo
BleepinComputer – TwitterAug 10 2020 18:48
Updated list of ransomware data leak sites to include Avaddon ransomware.
https://www.bleepingcomputer.com/news/security/list-of-ransomware-that-leaks-victims-stolen-files-if-not-paid/
da_667 – Then, infosec people pointed out that it just becomes a layer of obfuscation for all kinds of background noise and… https://t.co/eOvDln8xNS
da_667 – TwitterAug 11 2020 03:39
Then, infosec people pointed out that it just becomes a layer of obfuscation for all kinds of background noise and shit being blasted across the internet. See also most ransomware pay sites, onionduke, torsocks, and every fucking thing else in…
virusbtn – ESET researchers release a set of scripts to deobfuscate the Stantinko malware, that can be used for other malware… https://t.co/mWHjjaLIn2
virusbtn – TwitterAug 10 2020 11:09
ESET researchers release a set of scripts to deobfuscate the Stantinko malware, that can be used for other malware too https://www.welivesecurity.com/2020/08/07/stadeo-deobfuscating-stantinko-and-more/…
Vulnerabilities
CVEnew – CVE-2020-6070 An exploitable code execution vulnerability exists in the file system checking functionality of fsck.… https://t.co/XxQjRN9j6S
CVEnew – TwitterAug 10 2020 14:45
CVE-2020-6070 An exploitable code execution vulnerability exists in the file system checking functionality of fsck.f2fs 1.12.0. A specially crafted f2fs file can cause a logic flaw and out-of-bounds heap operations, resulting in code execution. An…
Critical ManageEngine ADSelfService Plus RCE flaw patched
Help Net Security – NewsAug 10 2020 09:15
A critical vulnerability (CVE-2020-11552) in ManageEngine ADSelfService Plus, an Active Directory password-reset solution, could allow attackers to remotely execute commands with system level privileges on the target Windows host. About…
CVEnew – CVE-2020-15651 A unicode RTL order character in the downloaded file name can be used to change the file’s name duri… https://t.co/14gwYmPNcX
CVEnew – TwitterAug 10 2020 18:45
CVE-2020-15651 A unicode RTL order character in the downloaded file name can be used to change the file's name during the download UI flow to change the file extension. This vulnerability affects Firefox for iOS < 28….
TeamViewer Flaw in Windows App Allows Password-Cracking
Threatpost.comAug 10 2020 15:56
Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.
Ongoing Campaigns
DDoS attacks in Q2 2020
SecurelistAug 10 2020 10:02
News overview Not just one but two new DDoS amplification methods were discovered last quarter. In mid-May, Israeli researchers reported a new DNS server vulnerability that lurks in the DNS delegation process. The vulnerability exploitation scheme was…

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

Silobreaker Daily Cyber Alert

Sign up for the latest news on data breaches, hacker groups, malware and vulnerabilities.

Silobreaker
This website uses cookies.
See our privacy policy at www.silobreaker.com/legal