Cookie Settings

This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.

Cyware Daily Threat Intelligence

Cyware Daily Threat Intelligence - Featured Image

Daily Threat Briefing Mar 17, 2021

While the cyber world is still reeling from the effects of recent large-scale supply-chain hacks, more conventional attack campaigns continue to resurface. Now, security researchers have discovered a cyber espionage campaign dubbed Operation Diànxùn that was found targeting numerous telecommunications providers across Southeast Asia, Europe, and the U.S.

In a bid to further their malicious operations, cybercrime groups are busy upgrading their arsenal. A new variant of Mirai botnet was found exploiting vulnerabilities in SonicWall SSL-VPN, D-Link DNS-320 firewall, Netgear ProSAFE Plus, Netis WF2419 wireless router, and other IoT devices. In other news, the FBI has warned of PYSA ransomware attacks against educational institutions in the U.K and the U.S.

Top Breaches Reported in the Last 24 Hours

Mimecast source code stolen

Mimecast revealed that SolarWinds attackers broke into its internal network and downloaded source code from a limited number of repositories. The attackers, moreover, gained access to a subset of email addresses, salted and hashed credentials, and contact info.

Operation Diànxùn

An espionage campaign dubbed Operation Diànxùn has been identified by the McAfee Advanced Threat Research Strategic Intelligence team. The attack tactics match those of RedDelta and Mustang Panda threat actors. The campaign is actively targeting telecommunication firms and the goal is suspected to be gaining access to covert information related to 5G technology.

SCCB suffers ransomware attack

South and City College Birmingham (SCCB) closed all eight of its campuses after a massive ransomware attack disabled its IT systems. All 13,000 students were informed about online lectures and have been asked to stay away from college campuses.

WeLeakInfo leaked info

A threat actor leaked data, including customer and payment information, from the WeLeakInfo data breach site and published it on another hacker forum - RaidForums. The now-defunct website contained around 12.5 billion user records, including names, email addresses, phone numbers, addresses, and passwords.

Top Malware Reported in the Last 24 Hours

PYSA ransomware attacks surge

The FBI has warned of PYSA ransomware attacks against educational institutions in the U.K and the U.S. The flash alert was released in coordination with DHS-CISA and offers IoCs to defend against the threat.

New Mirai variant

Unit 42 researchers discovered a new variant of Mirai botnet attacking SonicWall SSL-VPN, D-Link DNS-320 firewall, Netgear ProSAFE Plus, Netis WF2419 wireless router, and other IoT devices. Some of the vulnerabilities exploited by the malware are tracked as CVE-2020-25506, CVE-2020-26919, and CVE-2019-19356, among others.

Top Vulnerabilities Reported in the Last 24 Hours

**XSS flaw quacks in DuckDuckGo **

DuckDuckGo has fixed a universal XSS flaw in a popular browser extension—DuckDuckGo Privacy Essentials—for Firefox and Chrome. This flaw could allow attackers to execute arbitrary code on any domain.

Top Scams Reported in the Last 24 Hours

Phishing scam targets banks

A phishing scam has been spotted to lure Indian users into disclosing personal and banking information. The targeted banks include ICICI, State Bank of India, HDFC, Punjab National Bank, and Axis Bank. The links have been found to be originating from France and the U.S.

Related Threat Briefings