16 December 2020

This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact us here for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
Sunburst Backdoor 25 139
Dark Halo 11 18
AgentTesla Keylogger 9 14
APT29 10 45
Gitpaste-12 Malware 5 6
AridViper 5 7
NotPetya Ransomware 6 14
Cobalt Strike Beacon 6 12
PyMICROPSIA 4 9
UNC2452 5 27
Data Breaches
45 Million Medical Images Left Exposed OnlineThreatpost.com – Dec 15 2020 17:36A six-month investigation by CybelAngel discovered unsecured sensitive patient data available for third parties to access for blackmail, fraud or other nefarious purposes.
Medical scans of millions of patients exposed onlineWeLiveSecurity RSS – Dec 15 2020 19:57Other leaked data included a range of personal information such as names, addresses and personal healthcare information. The post Medical scans…
Dataset of 20 million malware samples exposed onlineIT Security Guru – Dec 15 2020 11:46On Monday the cybersecurity firms ReversingLabs and Sophos joined forces in order to release the first-ever production-scale dataset of malware research to be available to the public. They released the dataset in a bid to drive industry-wide…
Hacker Groups
Chat Digest – Black Shadow 2020/12/15 17:48 – 17:48 UTC“Black Shadow” – Telegram – Dec 15 2020 17:48[17:48] : 🔵 The selling of the first Shirbit data package has been finished. 🔴 **now we are going to sell the second package.** 📩 contact us __@blackshadowleaks __All of messages will be answered, please be patient.
Additional Dark Caracal IndicatorsIBM X-Force Exchange – Advisory Tag – RSS – Dec 15 2020 06:05Summary Following Checkpoint's recent report on the Dark Caracal threat group, the Electronic Frontier Foundation (EFF) has published previously unreported indicators of compromise (IoCs) associated with the actor. Threat Type Malware, RAT, APT Overview T…
ShadowChasing1 – Funny APT-C-27(GoldenMouse) APT payload sit https://t.co/jFZeTTovtyShadowChasing1 – Twitter – Dec 15 2020 14:17Funny APT-C-27(GoldenMouse) APT payload sit https://twitter.com/ShadowChasing1/status/1338850751741739011/photo/1
Facebook Describes APT32 Social Engineering CampaignKnowBe4 – Blog – RSS – Dec 15 2020 13:31
Malware
PyMICROPSIA Windows malware includes checks for Linux and macOSSecurity Affairs – Dec 16 2020 00:25Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms. Experts from Palo Alto Networks’s Unit 42 discovered a new Windows info-stealing malware, named…
CyberScoopNews – MountLocker ransomware hackers upgrade covert approach https://t.co/Xr5qAM5Aik by @shanvavCyberScoopNews – Twitter – Dec 15 2020 16:37MountLocker ransomware hackers upgrade covert approach https://hubs.ly/H0CDfVv0 by @shanvav
CyberScoopNews – MountLocker ransomware hackers upgrade covert approach https://t.co/LK9p5XpWJ5 by @shanvavCyberScoopNews – Twitter – Dec 16 2020 02:49MountLocker ransomware hackers upgrade covert approach https://hubs.ly/H0CGtmB0 by @shanvav
Vulnerabilities
CVEnew – CVE-2020-25712 A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may l… https://t.co/InzSHyKyNjCVEnew – Twitter – Dec 15 2020 17:45CVE-2020-25712 A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as…
helpnetsecurity – RT @Veracode: Majority of applications contain at least one security flaw and fixing those flaws typically takes months, our latest State o…helpnetsecurity – Twitter – Dec 15 2020 19:44RT @Veracode: Majority of applications contain at least one security flaw and fixing those flaws typically takes months, our latest State of Software Security report reveals. http://ow.ly/O3rA50CmYZ8 | #AppSec #SOSS11 @helpnetsecurity
SecurityWeek – Apple Patches Code Execution Vulnerabilities in iOS and iPadOS https://t.co/xv4AhbkrQWSecurityWeek – Twitter – Dec 15 2020 09:50Apple Patches Code Execution Vulnerabilities in iOS and iPadOS https://www.securityweek.com/apple-patches-code-execution-flaws-ios-and-ipados
State of Software Security v11: The Most Common Security Flaws in AppsSecurity Bloggers Network – Dec 15 2020 20:47 For our annual State of Software Security report, we always look at the most common types of…
Ongoing Campaigns
Chinese APT Groups Exploiting Corporate Software to Target Mongolian OrganizationsCyware – Dec 15 2020 19:24Recently, a new Chinese APT campaign dubbed Operation StealthyTrident has been observed by researchers from ESET and Avast . Researchers from both security firms have released separate details about this campaign. Diving into the details The…
virusbtn – Volexity researchers write about other attacks the group behind the SolarWinds supply chain attack (which they call… https://t.co/TqhlwmLdKavirusbtn – Twitter – Dec 15 2020 15:18Volexity researchers write about other attacks the group behind the SolarWinds supply chain attack (which they call Dark Halo) has been involved in, including a clever two-factor authentication bypass…
SolarWinds supply chain attack explained: Why organizations were not preparedCSO Online News – Dec 15 2020 11:44The recent breach of major cybersecurity company FireEye by nation-state hackers was part of a much…
sureshdr – RT @Beaker: Ah…supply chain attacks. Did people simply forget about incidents such as RSA or the MeDoc NotPetya attack?sureshdr – Twitter – Dec 15 2020 13:49RT @Beaker: Ah…supply chain attacks. Did people simply forget about incidents such as RSA or the MeDoc NotPetya attack?

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

Silobreaker Daily Cyber Alert

Sign up for the latest news on data breaches, hacker groups, malware and vulnerabilities.

Silobreaker
This website uses cookies.
See our privacy policy at www.silobreaker.com/legal