Cyware Monthly Threat Intelligence

Monthly Threat Briefing • Apr 2, 2020
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Monthly Threat Briefing • Apr 2, 2020
The Good
The month of March started off with several new developments and large data breaches in the cybersecurity world, but it ended with our timelines filled with COVID-19 updates. To begin with, Google developers created a new USB Keystroke Injection Protection tool to defend users against USB keystroke injection attacks. Meanwhile, The DHS’s CISA along with NIST has published guidelines for federal workers and contractors on securing data and systems while working remotely during the COVID-19 epidemic. Also, the NIST published its first draft for SP 800-53 (revision 5) after seven long years.
Google’s open-source developers released a new tool dubbed USB Keystroke Injection Protection to fend off stealthy USB keystroke injection attacks. The tool is effective on machines using the Linux operating system.
Academics at the University of Notre Dame came up with a project that utilizes artificial intelligence to identify deep fake videos, disinformation online and manipulated images. The project aims at protecting online users from spreading inaccurate information that can be harmful.
Amid the Coronavirus epidemic, the Cybersecurity and Infrastructure Security Agency (CISA) and National Institute of Standards and Technology (NIST) issued guidelines for federal workers and contractors working remotely to prevent cyberattacks on their networks.
The NIST published the draft for SP 800-53 (revision 5). This publication, titled “Security and Privacy Controls for Information Systems and Organizations,” reflects the major changes to the security landscape over the last few years. It intends to protect organizational operations and assets from cyberattacks.
The Cyber Security Agency of Singapore (CSA) announced the launch of a new Cybersecurity Labelling Scheme (CLS) to improve the security of IoT products against cyberattacks. The scheme is part of the country’s new Safer Cyberspace and will initially include Wi-Fi routers and smart home hubs.
The Bad
Amidst Coronavirus fears, data breach incidents did not come to a halt. While Weibo witnessed a major backlash after 538 million users were uploaded on a hacking forum, General Electric suffered a breach too, revealing the PII of its employees. In other news, AMD also reported the theft of its confidential source code of its graphics products.
Personal data of 538 million Weibo users were put up for sale on the dark web this week. The stolen data were priced at $250 as it did not include passwords. Among the personal data exposed, it included real names, site usernames, gender, and locations of users.
Hackers stole Advanced Micro Devices’ (AMD) source code files for both its current and future graphics processing units (GPUs) and demanded the company $100 million in return . The stolen blueprints, seemingly written in Verilog, were uploaded on GitHub over the previous weekend.
Virgin Media is facing a potential class-action lawsuit that could cost the company up to $5.6 billion in compensation payout for the customers affected in an April 2019 incident that left the personal details of 900,000 customers exposed online.
An unprotected Elasticsearch database exposed over 5 billion records collected by a UK-based research firm between 2012 and 2019. The leaky database contained extensive information on the breaches including domains, sources, contact email addresses, and passwords.
A data leak at Doxzoo affected over 270,000 records belonging to more than 100,000 users. The incident occurred due to a leaky S3 bucket. The leaked data included print jobs for many high-profile clientele, such as elite universities, Fortune 500 companies, and more.
General Electric (GE) suffered a data breach, affecting the PII of current and former employees as well as beneficiaries. The information exposed in the breach included direct deposit forms, drivers’ licenses, passports, birth certificates, marriage certificates, tax withholding forms, Social Security numbers, and more.
Personal data of over 6.9 million organ donors was compromised following the loss of two external hard storage drives. The external hard drives belonged to the Dutch government and included electronic copies of all donors filed with the Dutch Donor Register between February 1998 and June 2010.
Whisper app leaked 900 million secret posts and all the metadata related to those posts due to a misconfigured database. The firm took down the database on March 9, 2020, after it learned about the leak from other sources.
A web server containing records of about 76,000 unique fingerprints was left exposed on the internet. The unsecured fingerprint data along with employees’ email addresses and telephone numbers, had been collected by a Brazilian company called Antheus Tecnologia.
An unsecured database hosted on Google Cloud had exposed more than 200 million records related to US residents. The exposed data included a victim’s name, address, email address, age, gender, ethnicity, employment, credit rating, and property information.
The wireless carrier T-Mobile came under fire again for failing to protect users’ information after a security breach. The potentially leaked data included names, addresses, phone numbers, account numbers, rate plans, and billing information of users.
Sodinokibi ransomware operators published over 12 GB of stolen data belonging to a company named Brooks International for not paying the ransom. The exposed data includes usernames and passwords, credit card statements, tax information, and much more.
New Threats
Further, as we know, hackers are always innovating and experimenting with new hacking techniques. Security experts stumbled upon the notorious TrickBot trojan disguised as a malicious TrickMo app to bypass 2FA protection. Another cybercrime group targeted D-Link and Linksys’ DNS settings to infiltrate the routers with Oski information-stealing malware. The APT41 group was also spotted, exploiting vulnerabilities in Cisco routers, Citrix ADC, and Zoho ManageEngine last month.