Cyware Weekly Threat Intelligence - May 20–24

Weekly Threat Briefing • May 24, 2019
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • May 24, 2019
The Good
We’re back with the most interesting threat intel of the week. The past week witnessed several cybersecurity advancements, security incidents, as well as the emergence of new threats. To begin with, let’s first glance through all the positive developments that have emerged over the past week. The University of New Haven has been designated as a National Center of Academic Excellence in Cyber Operations. The European Union has established a new framework to impose targeted restrictive measures to respond to cyber attacks. Meanwhile, the Department of Financial Services has announced the formation of a ‘Cybersecurity Division’ that aims at protecting consumers and industries from cyber attacks.
The University of New Haven has been designated as a National Center of Academic Excellence (CAE) in Cyber Operations (CAE-CO) by the National Security Agency (NSA). The certification recognizes the University’s bachelor’s degree programs in cybersecurity & networks and computer science.
New York’s Department of Financial Services has announced the formation of a dedicated ‘Cybersecurity Division’, which will focus on protecting consumers and industries from cyber threats. The new division will enforce cybersecurity regulation, advise on cybersecurity issues, provide guidance on DFS’s cyber regulation, and conduct cyber-related investigations.
The European Union has established a new framework to impose targeted restrictive measures to respond to cyber attacks. The restrictive measures include imposing travel bans and asset freezes for attempted attacks. Almost 28 EU countries have voted unanimously to impose the measures if the attack is deemed to have a significant impact.
The Bad
Several data breaches and security incidents were witnessed over the past week. IT giant HCL leaked employees’ personal information, passwords, and customer data online. Google accidentally stored passwords for some of its G suite users in plaintext since at least 2005. Meanwhile, Salesforce deployed a database script to its production environment that inadvertently gave employees access to the company’s files.
HCL has inadvertently leaked employees’ personal information and plaintext passwords, customer reports, and web applications for managing personnel. The exposed employee information includes candidate ID, name, mobile number, joining date, joining location, recruiter SAP code, recruiter name, created date, user name, cleartext password, BGV status, offer accepted, and a link to the candidate form.
Over 12,000 unprotected MongoDB databases have been deleted by Unistellar attackers, who left behind a ransom note asking the owners of the databases to contact them to have the data restored. The reason for asking the owners to contact might be the fact that the hacker could charge ransom amount in cryptocurrency according to the sensitivity of the database.
Cancer Treatment Centers of America (CTCA) at Southeastern Regional Medical Center suffered a data breach compromising patients’ Protected Health Information (PHI). The compromised information includes names, phone numbers, addresses, medical record numbers, health insurance information, government IDs, and medical information.
The SLCERT has uncovered that websites of almost 11 institutions in Sri Lanka have been hacked and defaced by attackers. The impacted websites include those of the Kuwait Embassy in Colombo, the Tea Research Institute in Talawakelle, The Rajarata University in Mihintale and 10 other private institutions. However, none of the gov.lk websites have been affected by the attacks.
Salesforce deployed a database script to its production environment that inadvertently broke the access permission settings across organizations and gave employees access to all of their company's files. Salesforce customers in Europe and North America were the most impacted by this incident.
An unprotected database belonging to Chtrbox, a social media marketing firm, has exposed the contact information of over 49 million Instagram influencers, celebrities, Food bloggers, and brand accounts. The exposed information includes Instagram bio, profile picture, number of followers, email addresses, locations, and phone numbers.
The Louisville Regional Airport Authority suffered a ransomware attack, forcing the authority to work hard towards restoring the encrypted files via backups. The ransomware encrypted the municipal corporation’s localized files, however, it did not affect operations or security systems at Louisville Muhammad Ali International Airport and Bowman Field.
Google accidentally stored unhashed passwords for some of its G suite users for almost 14 years due to an implementation error. Google confirmed that there has been no evidence of any improper access to or misuse of the impacted G Suite passwords.
Attackers infected Coventry High School’s IT systems with Trickbot malware, forcing the school to cancel all classes and send the students back to home. Trickbot infection has affected the school’s phone and HVAC systems. To recover from the malware attack, the school has reinstalled over 1,000 computers.
An unprotected Elasticsearch database belonging to Game Golf has exposed millions of Golfer records including GPS details from courses played, usernames and passwords, as well as Facebook login credentials.
The user data of Truecaller including names, phone numbers and email addresses are available for sale on private internet forums. The personal data of Truecaller users are sold for as high as 25000 Euros on the dark web. However, data belonging to Indian users are being sold at 2000 Euros. The dataset for sale contains personal identifiers, the state of residence and users’ mobile service providers.
An extortion scam campaign purported to come from a law firm has targeted over 100,000 business email addresses with fake legal threats. A phishing kit reported to be a part of the campaign showed that the targets were primarily Canadian businesses.
Attackers broke into Perceptics’s network and stole its internal files. The stolen files that contain sensitive data are made available on the dark web for free. The stolen files included Microsoft Exchange and Access databases, ERP databases, HR records, Microsoft SQL Server data stores, and more. These databases contained sensitive information related to border security data acquisition, commercial vehicle inspection, electronic toll collection, and roadway monitoring.
New Threats
In the past week, the occurrences of several new malware strains and vulnerabilities were detected. Researchers uncovered a new variant of the Trickbot trojan that is distributed via Redirection URL in a spam email campaign. A new variant of Mirai botnet has been spotted leveraging a total of 13 different exploits to target routers and other IoT devices. Meanwhile, a researcher named SandboxEscaper has published the demo exploit code for three Microsoft zero-day vulnerabilities.