17 November 2020

This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact us here for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
Lazarus Group 13 24
Jupyter Infostealer 11 18
Cult of the Dead Cow 8 8
Malsmoke 5 5
Ragnar Locker 10 34
Zloader Malware 4 6
TroubleGrabber 3 7
Cerium (Threat Actor) 3 9
Silent Night 2 2
Lazarus Group Malware 2 2
Data Breaches
Report: Facebook Credit Card Scam Exposed Via Huge Data LeakMalwareTips.com – Nov 17 2020 06:13Led by Noam Rotem and Ran Locar, vpnMentor’s research team recently uncovered a potentially massive phishing and credit card fraud operation targeting Facebook users. We discovered the… Click to expand……
Dinosn – Exposed Database Reveals 100K+ Compromised Facebook Accounts https://t.co/m7FhR6RAiPDinosn – Twitter – Nov 16 2020 17:54Exposed Database Reveals 100K+ Compromised Facebook Accounts https://threatpost.com/exposed-database-100k-facebook-accounts/161247/
Exposed Database Reveals 100K+ Compromised Facebook AccountsThreatpost.com – Nov 16 2020 16:53Cybercriminals left an ElasticSearch database exposed, revealing a global attack that compromised Facebook accounts and used them to scam others.
6 security shortcomings that COVID-19 exposedCSO Online News – Nov 16 2020 11:00A year ago, in the fall of 2019, Mike Zachman ran a security drill for his company, Zebra Technologies Corp. Zachman, who as …
Hacker Groups
CostaRicto cyber mercenary group engaging in espionage for its clientsIsrael Defense – Nov 16 2020 11:42A new hacker group dubbed CostaRicto by BlackBerry investigators is selling its services to entities needing APT-level hacking expertise in cyber espionage campaigns that target many industrial sectors. The toolset of the hacker-for-hire group…
Malsmoke operators abandon exploit kits in favor of social engineering schemeTerabitWeb Blog – RSS – Nov 16 2020 18:00Original Post from Malwarebytes Labs Author: Threat Intelligence Team Exploit kits continue to be used…
ShinyHunters Target Numerous Firms In A Recent Wave Of Data BreachesLatest Hacking News – RSS – Nov 16 2020 15:20A new wave of data breaches emerges as reports about millions of data being stolen from different firms surface online. …
Lazarus Group Used Supply Chain Attack to Target South Korean Users with MalwareSecurity Bloggers Network – Nov 16 2020 12:34The Lazarus group leveraged a supply chain attack to target users located in South Korea with custom malware. On November 16, ESET disclosed that the Lazarus group conducted its supply chain attack by abusing WIZVERA VeraPort. This application…
Malware
Jupyter trojan: Newly discovered malware stealthily steals usernames and passwordsZDNet Security – Nov 16 2020 13:02Morphisec researchers detail campaign which steals Chromium, Firefox, and Chrome browser data.
InfoSecHotSpot – DarkSide placed on restricted list following Iranian hosting announcement Coveware, the ransomware negotiation firm… https://t.co/muI2gXmdeFInfoSecHotSpot – Twitter – Nov 16 2020 14:28DarkSide placed on restricted list following Iranian hosting announcement Coveware, the ransomware negotiation firm, have recently placed DarkSide operation on an internal restricted list following the threat actor’s announcement to host…
ZDNet – Jupyter trojan: Newly discovered malware stealthily steals usernames and passwords https://t.co/mxPvjOAzWSZDNet – Twitter – Nov 16 2020 14:15Jupyter trojan: Newly discovered malware stealthily steals usernames and passwords…
ZDNet – Jupyter trojan: Newly discovered malware stealthily steals usernames and passwords https://t.co/o3FSsaVn9eZDNet – Twitter – Nov 16 2020 18:30Jupyter trojan: Newly discovered malware stealthily steals usernames and passwords…
Vulnerabilities
CVEnew – CVE-2020-10776 A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for t… https://t.co/IhdkRCHTRFCVEnew – Twitter – Nov 17 2020 02:45CVE-2020-10776 A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack….
Heartbleed, BlueKeep and other vulnerabilities that didn’t disappear just because we don’t talk about them anymore, (Mon, Nov 16th)SANS Internet Storm Center, InfoCON: green – Nov 16 2020 07:11Since new critical vulnerabilities are discovered and published nearly every day, it is no wonder that we (i.e. security professionals and security-oriented media) tend to focus on these and don’t return to the ones that came before too…
CVEnew – CVE-2020-25705 A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that al… https://t.co/2ZXjoZAfZGCVEnew – Twitter – Nov 17 2020 02:45CVE-2020-25705 A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization….
Anyone tried finding out vulnerabilities on this site yet?Reverse Engineering – Nov 16 2020 17:06submitted by /u/Mateusz3010 [link] [comments]
Ongoing Campaigns
The seven elements of successful DDoS defenceInformation Age – Nov 16 2020 14:19Chris Waynforth, area vice-president at Imperva, identifies the seven key elements to consider when drawing up a successful DDoS defence strategy DDoS frequency and severity have been rising this year. 2020 already holds more than enough challenges for…
What Is a Brute Force Attack?TechNadu – Nov 16 2020 14:05How valuable is your data? How secure is your password? For anyone who uses internet services, the answer to both of these questions is probably quite concerning. Even though you might not always understand why the data you leave in the hands of large…
Targeted Spear-Phishing on the RiseSecurity Bloggers Network – Nov 16 2020 07:00
New skimmer attack uses WebSockets to evade detectionSecurity Affairs – Nov 16 2020 07:51Experts spotted a new skimmer attack that used an alternative technique to exfiltrate payment information from payment cards. Researchers from Akamai discovered a new skimmer attack that is targeting several e-stores with a new technique to…

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

Silobreaker
This website uses cookies.
See our privacy policy at www.silobreaker.com/legal