22 January 2021

This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact us here for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
MrbMiner 16 16
UNC2452 12 31
Sodinokibi Ransomware 5 6
Vadokrist Malware 3 3
DarkHotel Group 3 3
Gorgon Group 3 3
Teardrop Dropper 5 25
LuckyBoy-3PC 3 7
EMOTET Trojan 11 36
VandaTheGod 5 16
Data Breaches
SecurityWeek – Enterprise Credentials Publicly Exposed by Cybercriminals https://t.co/kmR6iDuxyoSecurityWeek – Twitter – Jan 21 2021 18:28Enterprise Credentials Publicly Exposed by Cybercriminals https://www.securityweek.com/enterprise-credentials-publicly-exposed-cybercriminals
SecurityWeek – Enterprise Credentials Publicly Exposed by Cybercriminals https://t.co/kmR6iDcW9OSecurityWeek – Twitter – Jan 22 2021 03:55Enterprise Credentials Publicly Exposed by Cybercriminals https://www.securityweek.com/enterprise-credentials-publicly-exposed-cybercriminals
Enterprise Credentials Publicly Exposed by CybercriminalsSecurityWeek RSS Feed – Jan 21 2021 17:45Cybercriminals behind a successful phishing campaign have exposed more than 1,000 corporate employee credentials on the Internet, according to a warning from security vendor Check Point. …
Shazam Vulnerability exposed location of Android, iOS usersHackRead – Jan 21 2021 17:26By Sudais Asif The vulnerability in Shazam was identified in 2019 but the details of it were only revealed last week. Can’t find out what’s the name of that song on television? You know who’ll help – Shazam. Recently…
Hacker Groups
Chinese hacking group ‘Chimera’ targets Taiwanese semiconductor and airline companiesSiliconANGLE – Jan 22 2021 02:55An advanced threat protection group from China is allegedly targeting Taiwanese companies according to cybersecurity company CyCraft. In their report into an APT they dub “Chimera,” researchers at CyCraft claim that the APT, under the…
1.9 Million user records stolen from Pixlr like email I’d and login names were leaked by ShinyHuntersNextBigWhat – Jan 21 2021 13:30The hacker, ShinyHunters, have breached several organizations in the past. The post 1.9 Million user records stolen from Pixlr like email I’d and login names were leaked by ShinyHunters appeared first on NextBigWhat .
opexxx – A Deep Dive Into Patchwork APT Group | Cyble https://t.co/ABkwdTBDuqopexxx – Twitter – Jan 21 2021 23:11A Deep Dive Into Patchwork APT Group | Cyble https://cybleinc.com/2021/01/20/a-deep-dive-into-patchwork-apt-group/
ShinyHunters Leak 1.9 Mn Pixlr Users’ Records OnlineCISO MAG – Cyber Security Magazine – Jan 22 2021 05:56
Malware
Malware found on laptops given out by governmentBBC News – Technology – Jan 21 2021 13:07Suspicious files contacting Russian servers are thought to have been found on devices given to schools.
Vadokrist: A wolf in sheep’s clothingWeLiveSecurity RSS – Jan 21 2021 10:30Another in our occasional series demystifying Latin American banking trojans The post Vadokrist: A wolf in sheep’s clothing appeared…
‘LuckyBoy’ Malvertising Campaign Hits iOS, Android, XBox UsersMalwareTips.com – Jan 21 2021 14:19A recently identified malvertising campaign targeting mobile and other connected devices users makes heavy use of obfuscation and cloaking to avoid detection. Dubbed LuckyBoy, the… Click to expand……
virusbtn – Trend Micro researchers analyse a sophisticated exfiltration attempt using a variant of the PlugX malware… https://t.co/4c2zWrJEEzvirusbtn – Twitter – Jan 21 2021 13:51Trend Micro researchers analyse a sophisticated exfiltration attempt using a variant of the PlugX malware https://www.trendmicro.com/en_us/research/21/a/xdr-investigation-uncovers-plugx-unique-technique-in-apt-attack.html…
Vulnerabilities
Securityblog – VLC Media Player 3.0.12 fixes multiple remote code execution flaws https://t.co/4IWSgAfrYgSecurityblog – Twitter – Jan 21 2021 08:29VLC Media Player 3.0.12 fixes multiple remote code execution flaws https://www.bleepingcomputer.com/news/software/vlc-media-player-3012-fixes-multiple-remote-code-execution-flaws/
SecurityWeek – Scanning Activity Detected After Release of Exploit for Critical SAP SolMan Flaw https://t.co/SDCF2JvqDtSecurityWeek – Twitter – Jan 21 2021 09:30Scanning Activity Detected After Release of Exploit for Critical SAP SolMan Flaw https://www.securityweek.com/scanning-activity-detected-after-release-exploit-critical-sap-solman-flaw
Securityblog – Exploiting CVE-2020-15994 Chrome WebAssembly Engine UAF Vulnerability https://t.co/hy7T5VnscuSecurityblog – Twitter – Jan 21 2021 08:33Exploiting CVE-2020-15994 Chrome WebAssembly Engine UAF Vulnerability https://blog.br0vvnn.io/pages/blogpost.aspx?id=5
Major Security Flaws Found In Signal And other Video Chat AppsInformation Security Buzz – Jan 21 2021 14:49As reported by TechRadar, vulnerabilities found in Signal, Google Duo, Facebook Messenger, and other messaging apps allowed attackers to listen in on users without their permission, security experts have warned. “On… The ISBuzz Post:…
Ongoing Campaigns
SolarWinds Attack: Microsoft sheds lights into Solorigate second-stage activationSecurity Affairs – Jan 21 2021 12:01Microsoft’s report provides details of the entire SolarWinds attack chain with a deep dive in the second-stage activation of malware and tools. Microsoft published a new report that includes additional details of the SolarWinds supply chain attack….
Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their PartsTenable Blog – Jan 21 2021 14:49Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts By Lamine Aouad on January 21st, 2021 Facebook LinkedIn Twitter Subscribe With the rise of daisy-chained cyberattacks, security teams must consider the contextual risk of…
New Phishing Attack Impersonates PayPal with Threats of ’Flagged‘ ProfilesHOTforSecurity – Jan 21 2021 16:14Security researchers identified a phishing attack impersonating PayPal that allowed criminals to access people’s credentials, their PayPal account, and then their finances. Credentials for access to financial resources will always be a target for…
InfoSecHotSpot – How to check for and stop DDoS attacks on Linux Jack Wallen walks you through some of the steps you can take to che… https://t.co/kS22a3kPA8InfoSecHotSpot – Twitter – Jan 21 2021 20:29How to check for and stop DDoS attacks on Linux Jack Wallen walks you through some of the steps you can take to check for and mitigate distributed denial of service attacks on a Linux server. https://tek.io/3o3xE6T…

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

Silobreaker
This website uses cookies.
See our privacy policy at www.silobreaker.com/legal