18 November 2020

This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact us here for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
Jupyter Infostealer 7 25
Carbanak 5 5
Zloader Malware 5 10
APT10 4 5
Egregor Ransomware 7 21
Cult of the Dead Cow 4 12
NIBIRU Ransomware 3 3
Remcos RAT 3 3
Cerium (Threat Actor) 3 12
Lazarus Group 4 27
Data Breaches
Micropayments Firm ‘Coil’ Spectacularly Exposed User Email AddressesTechNadu – Nov 17 2020 13:18‘Coil’ has exposed its users’ email addresses in chunks of thousands to other users. This creates “email storm” opportunities that the recipients have resisted thus far. The exposure also opens up credential stuffing and password brute-forcing…
SecurityWeek – Hundreds of Tesla Powerwall Gateways Potentially Exposed to Hacker Attacks https://t.co/gKtwui0VChSecurityWeek – Twitter – Nov 17 2020 15:51Hundreds of Tesla Powerwall Gateways Potentially Exposed to Hacker Attacks https://www.securityweek.com/hundreds-tesla-powerwall-gateways-potentially-exposed-hacker-attacks
SecurityWeek – Hundreds of Tesla Powerwall Gateways Potentially Exposed to Hacker Attacks https://t.co/gKtwuiiwtPSecurityWeek – Twitter – Nov 18 2020 04:11Hundreds of Tesla Powerwall Gateways Potentially Exposed to Hacker Attacks https://www.securityweek.com/hundreds-tesla-powerwall-gateways-potentially-exposed-hacker-attacks
Hundreds of Tesla Powerwall Gateways Potentially Exposed to Hacker AttacksSecurityWeek RSS Feed – Nov 17 2020 15:51Hundreds of Tesla Powerwall Backup Gateways may have been exposed to remote hacker attacks from the internet, but Tesla says it has taken steps to reduce risks. …
Hacker Groups
Malsmoke Changes TacticsIBM X-Force Exchange – Advisory Tag – RSS – Nov 17 2020 16:18Summary Malwarebytes Labs describes a campaign dubbed "Malsmoke" that has switched from exploit kits to social engineering to gather more victims. Threat Type Malware, Exploit Kits, Social Engineering Overview A campaign dubbed Malsmoke had been staked…
malwrhunterteam – Is this TeamTNT is that TeamTNT?
🤔
“Red Teaming”
😂 https://t.co/u74hzOE20L
malwrhunterteam – Twitter – Nov 17 2020 19:27Is this TeamTNT is that TeamTNT?
🤔
"Red Teaming"
😂 https://twitter.com/malwrhunterteam/status/1328781762592452611/photo/1
JAMESWT_MHT – RT @malwrhunterteam: Is this TeamTNT is that TeamTNT?
🤔
“Red Teaming”
😂 https://t.co/u74hzOE20L
JAMESWT_MHT – Twitter – Nov 17 2020 21:09RT @malwrhunterteam: Is this TeamTNT is that TeamTNT?
🤔
"Red Teaming"
😂 https://twitter.com/malwrhunterteam/status/1328781762592452611/photo/1
Symantec implicates APT10 in sweeping hacking campaign against Japanese firmsCyberscoop – News – Nov 17 2020 22:00A Chinese government-linked hacking group whose operatives have been indicted by the U.S. and sanctioned by the European Union is suspected in a year-long effort to steal sensitive data from numerous Japanese companies and their subsidiaries,…
Malware
InfoSecHotSpot – How to speed up malware analysis Today malware evolves very fast. Loaders, stealers, and different types of ransomw… https://t.co/ZWaOo5DmHuInfoSecHotSpot – Twitter – Nov 17 2020 21:58How to speed up malware analysis Today malware evolves very fast. Loaders, stealers, and different types of ransomware change so quickly, so it’s become a real challenge to keep up with them. Along with that analysis of them becomes harder and more…
Experts Insight On Jupyter Trojan – Newly Discovered Malware Stealthily Steals Usernames And PasswordsInformation Security Buzz – Nov 17 2020 12:24The cybersecurity company Morphisec has discovered Jupyter infostealer on the network of an unnamed higher education establishment in the US. A newly uncovered trojan malware  campaign is targeting businesses and higher education in what appears to…
How to speed up malware analysisHelp Net Security – News – Nov 17 2020 10:33Today malware evolves very fast. Loaders, stealers, and different types of ransomware change so quickly, so it’s become a real challenge to keep up with them. Along with that analysis of them becomes harder and more time-consuming. But…
ZDNet – Jupyter trojan: Newly discovered malware stealthily steals usernames and passwords https://t.co/e0oTPxiagKZDNet – Twitter – Nov 17 2020 07:15Jupyter trojan: Newly discovered malware stealthily steals usernames and passwords…
Vulnerabilities
246869 Windows systems are still vulnerable to the BlueKeep flawSecurity Affairs – Nov 17 2020 12:03 In May 2019, Microsoft disclosed the BlueKeep vulnerability, more than a year later over 245,000 Windows systems still remain unpatched. Over a year ago …
InfoSecHotSpot – Cisco Patches Critical Flaw After PoC Exploit Code Release A critical path-traversal flaw (CVE-2020-27130) exists i… https://t.co/yCOIDGmFUEInfoSecHotSpot – Twitter – Nov 17 2020 17:58Cisco Patches Critical Flaw After PoC Exploit Code Release A critical path-traversal flaw (CVE-2020-27130) exists in Cisco Security Manager that lays bare sensitive information to remote, unauthenticated attackers. https://bit.ly/35EWYuk…
securityaffairs – 246869 Windows systems are still vulnerable to the BlueKeep flaw
https://t.co/LFcnmGPYzL
#securityaffairs #hacking
securityaffairs – Twitter – Nov 17 2020 14:54246869 Windows systems are still vulnerable to the BlueKeep flaw

246869 Windows systems are still vulnerable to the BlueKeep flaw


#securityaffairs #hacking

securityaffairs – 246869 Windows systems are still vulnerable to the BlueKeep flaw
https://t.co/LFcnmGynbb
#securityaffairs #hacking
securityaffairs – Twitter – Nov 17 2020 19:46246869 Windows systems are still vulnerable to the BlueKeep flaw

246869 Windows systems are still vulnerable to the BlueKeep flaw


#securityaffairs #hacking

Ongoing Campaigns
Phishing awareness and phishing training explainedAlienVault Blogs – Nov 17 2020 18:14There is no more effective initial attack vector than phishing. With an ability to reach well-within your organization’s logical perimeter all the way down to an individual user’s Inbox with some form of malicious content, phishing has…
DNS Cache Poisoning Attack Back with a New TrickCyware – Nov 17 2020 18:36DNS cache poisoning are the attacks in which an attacker manipulates the information entered into a DNS cache to redirect users to the wrong websites. It is an old yet potentially effective attack vector that several cyber adversaries use. What was…
Jupyter Trojan Steals Chrome Firefox Data and Opens BackdoorE Hacking News – Nov 17 2020 17:33Researchers at Morphisec has recently discovered a trojan malware campaign targeted at stealing information from businesses and higher education. Reportedly, the malware named Jupyter has been used by Russian speaking hackers to gather data from…
VoltPillager: Hardware-based fault injection attacks against Intel SGX enclavesSecurity Affairs – Nov 17 2020 09:18Boffins devised a new attack, dubbed VoltPillager, that can break the confidentiality and integrity of Intel SGX enclaves by controlling the CPU core voltage. A group of six researchers from the University of Birmingham has devised…

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

Silobreaker
This website uses cookies.
See our privacy policy at www.silobreaker.com/legal