Cyware Monthly Cyber Threat Intelligence

Monthly Threat Briefing • August 3, 2018
Monthly Threat Briefing • August 3, 2018
As cyber threats and attacks continue to become more sophisticated and frequent, it is vital to acknowledge and celebrate every hard-earned advance made towards improving security, enhancing technology and safeguarding both users and devices. The month of July saw significant measures being taken to protect people against cyber threats.
Britain’s HMRC said it took down 20750 malicious websites. China arrested 20 suspects in a major cryptojacking case. Ukraine’s Secret Service said it stopped a VPNFilter attack on a chlorine distillation plant.
Google Chrome labelled all HTTP sites as ‘not secure’ and added a new Spectre fix. Tinder beefed up its data security with encryption and Instagram is working on a new, non-SMS 2FA system. Microsoft, Google, Facebook and Twitter partnered up for the Data Transfer Project.
On the research side, experts are working on a program to stop hacking by supercomputers. Meanwhile, researchers at the University of Geneva discovered Ytterbium that could change the face of quantum computing. Researchers from Ben-Gurion University came up with a new method of detecting malicious emails.
Britain’s tax authority HM Revenue and Customs said it requested a record 20,750 malicious to be taken down over the past 12 months. It has also been trialing technology that identifies phishing messages that claim to be from the HMRC and stop them from being delivered. The initiative has resulted in a 90% reduction in people reporting spoof HMTC-related messages since April 2017.
Google Chrome has marked all unencrypted websites as ‘not secure’. With the release of Chrome 68, the browser now flags any site with a Hypertext Transfer Protocol (HTTP) address rather than a Hypertext Transfer Protocol Secure (HTTPS) address.
Popular dating site Tinder finally shored up its data privacy by encrypting photos uploaded by its users. Swipe data and other actions have also been padded so that they appear the same size when they are being transferred, thus preventing any snoops from identifying users’ activities.
In China, 20 suspects were arrested in connection to a major cryptojacking case that affected 3.89 million computers since 2015 and generated 15 million yuan ($2.2 million) in illicit profits. Chinese tech giant Tencent discovered the malware embedded in software designed to help gamers cheat was actually used to mine cryptocurrency. Authorities were alerted in January and a dedicated task force was created to handle the probe.
The Ukranian Secret Service detected and shut down a cyberattack that used the infamous VPNFilter malware to target a chlorine distillation station. The malware strain targets a large number of router models, can survive device reboots, monitor and intercept traffic, and even brick infected devices. The agency accused Russia of operating VPNFilter and launching the attack.
Google’s new Chrome release came with a Site Isolation feature to protect against side-channel attacks like Spectre. Enabled by default, this fix helps prevent attackers from using speculative execution features of most processors to access parts of memory that should otherwise be restricted. However, the fix also increases Chrome RAM usage by about 10-13 percent.
Japan and the European Union are strengthening their cybersecurity cooperation ahead of the 2020 Tokyo Olympic and Paralympic Games. To tackle cyber attacks and threats, Japan is acquiring and exchanging knowledge and best practices on cybersecurity with EU, as well as making collaborative efforts in developing new capabilities.
Colton Grubbs, the 21-year-old malware author behind the infamous LuminosityLink RAT, pleaded guilty in federal court. He admitted to creating the RAT in April 2015 and later sold it online via hacking forums under the online moniker KFC Watermelon. US authorities secretly arrested Grubb in July 2017.
Irish resident and alleged administrator of the now-defunct Silk Road, Gary Davis, was extradited to the US to face charges over his involvement with the Dark Web marketplace. Facing charges of computer intrusion, money laundering and narcotics distribution, Davis could face life in prison if convicted.
The Girl Scouts of the USA unveiled a new set of 30 STEM badges that girls aged 5 to 18 can earn for efforts, completing activities and advocacy in “some of society’s most pressing needs.” The new STEM badges will help girls hone their skills in coding, robotics, cybersecurity, mechanical engineering and more.
Instagram is upgrading its two-factor authentication (2FA) that would not require a user’s phone number to better guard against SIM hacking. The social media company confirmed it is building a token-based 2FA system that works with security apps like Google Authenticator or Duo. Users can receive a special code to log in that can’t be generated on a different phone used by a hacker in a SIM porting attack .
Researchers at Australia’s Monash University developed a post-quantum secure algorithm to help stop cyberattacks by supercomputers. The Lattice-Based One Time Ring Signature (L2RS) deploys cryptographical techniques designed to protect the privacy of users, large transactions and transfer of data without risk of being hacked by quantum computers.
In partnership with CNRS, researchers at the University of Geneva (UNIGE) discovered a new material. The material contains Ytterbium, an element that can store and protect the fragile quantum information when operating at high frequencies. Ytterbium could change the face of quantum computing in the coming years.
A new initiative called the Data Transfer Project (DTP) was undertaken by Microsoft, Google, Facebook, and Twitter to simplify data sharing across services. This open-source effort is working towards building tools that enable users to share data directly from one service to another. Eventually, users will no longer have to download and re-upload information.
Google may have proved that security keys are more efficient than multi-factor authentication. Ever since the company’s employees started using physical keys, there hasn’t been a single case of account takeover via phishing.
A new method of detecting malicious emails was released by a group of researchers from Ben-Gurion University. Researchers said this method could outperform 60 top-selling anti-virus programs. By leveraging machine learning algorithms, malicious emails could be detected when used in conjunction with features suggested by related work.
Several major data breaches came to light in July as well - both malicious and accidental - that exposed millions of users. US law enforcement personnel data was exposed by an active shooter training center. The NHS blamed a coding error for a major data-sharing mistake. Typeform said hackers managed to download a backup of its customers’ data.
Companies around the world including Macy’s, TimeHop, Domain Factory, Telefonica and Thomas Cook suffered breaches. Polar Flow exposed the locations of spies and military personnel worldwide. Hackers stole 600 gallons of gas while Reaper drone documents were spotted for sale on the Dark Web. Thousands of Dahua DVR passwords were exposed via ZoomEye. Robocent leaked thousands of US voter records. Millions were impacted in the Telefonica breach. Researchers discovered sensitive data belonging to GM, Ford, Toyota, Tesla, Fiat Chrysler and other major firms was exposed online.
A healthcare group in Singapore was targeted by cybercriminals who stole over 1 million patients’ data. Some significant cyberattacks that occured over the past 30 days include LabCorp that was hit with ransomware, Ubisoft that suffered DDoS attacks and MyEthernet that was targeted by threat actors. Hackers also managed to attack a gas pump in Detroit to steal $1800 worth of gas.
The month of July also saw various strains of malware, ransomware and new techniques developed and leveraged to exploit unsuspecting users. The OSX.Dummy was found targeting crypto-investors, Magniber ransomware become a global threat and Upatre was upgraded with new evasion techniques. The double threat Rakhni Trojan can choose to mine or encrypt.
New variants of Spectre was discovered, Gandcrab ransomware v4 popped up and unique extortion scam that uses hacked passwords to scare victims is making the rounds.
Researchers found hackers could use thermal imaging to read key presses. Fancy Bear hackers were found to behind the new ‘Roman Holiday’ campaign. Meanwhile, several vulnerabilities were also discovered in AVTech devices and Apache OpenWhisk. A malware author also managed to build a massive botnet in a day.