Cyware Weekly Threat Intelligence, April 06 - April 10, 2020

Weekly Threat Briefing • April 10, 2020
Weekly Threat Briefing • April 10, 2020
The Good
As the COVID-19 pandemic has forced a massive adoption of remote working, numerous organizations now need to secure their extended threat environment. To aid organizations in this transition, Microsoft this week released new security guidance detailing the various attack vectors and tactics used by threat actors to leverage the pandemic to target employees working from home. On the other hand, the Canadian Internet Registration Authority (CIRA) launched a country-wide Domain Name System (DNS) filtering service to protect critical infrastructure and organizations from malware and phishing threats.
Microsoft published new threat intel and security guidance for individuals and organizations in the wake of rising incidents of phishing and social engineering attacks that have hit every country during the coronavirus pandemic.
Canadian Internet Registration Authority (CIRA) launched a country-wide DNS filtering service to block malware and phishing threats, with early access given to healthcare workers, small businesses, and educational institutions.
The Commonwealth Scientific and Industrial Research Organisation (CSIRO), an Australian federal agency, announced the creation of the seL4 Foundation, a not-for-profit organization, to accelerate the development of the seL4 microkernel and related technologies. The seL4 project is designed to be the world’s first operating system (OS) kernel that is mathematically proved secure.
Google released a free software security book, titled 'Building Secure and Reliable Systems', that provides first-hand lessons in avoiding and responding to failures caused by attackers or small internal changes. The book provides valuable insights into how security teams can improve their site reliability engineering (SRE) practices.
Nominet, a UK-based domain name registrar, blocked 600 coronavirus-themed websites that were found scamming the public by selling fake vaccines, protective equipment, and fraud remedies.
The Bad
The week saw a number of significant data leaks and other noteworthy incidents. The email marketing firm, Maropost, exposed an unsecured database containing 95 million records with information on its numerous clients. Meanwhile, researchers also reported a massive BGP hijacking attack by the Russian state-owned telecom provider that redirected the web traffic of more than 200 Content Delivery Networks (CDNs) and cloud hosting providers. The affected companies included the likes of Google, Amazon, Facebook, Akamai, and Cloudflare.
New Threats
Despite a lockdown across many countries, hackers continue to evolve their malicious exploits and attack techniques. This week, researchers came across two new advanced botnets, namely Dark Nexus and DDG. While Dark Nexus is capable of performing DDoS attacks on various IoT devices, DDG is a sophisticated cryptomining botnet that is capable of functioning independently of its C2 servers, using its proprietary P2P protocol. A new ‘Mouse-Over’ attack technique affecting Microsoft PowerPoint was also discovered this week. The technique can allow attackers to bypass security restrictions and manipulate user files on targeted devices.