Cyware Weekly Threat Intelligence, October 14 - October 18, 2019

Weekly Threat Briefing • Oct 18, 2019
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • Oct 18, 2019
The Good
Another week has almost come to an end, and it was quite an eventful one in cyberspace. Let’s begin our weekly roundup with the positive cybersecurity advancements. The Medical Imaging & Technology Alliance (MITA) has released a cybersecurity playbook on medical device security and risk management processes. The Healthcare and Public Health Sector Coordinating Council (HSCC) has published guidance focusing on supply chain cybersecurity risk management. Meanwhile, Microsoft and NIST are working on a new guide to make enterprise patch management easier.
The Medical Imaging & Technology Alliance (MITA) has published a cybersecurity playbook for radiologists and health delivery organizations. It is designed to deal with medical device security and risk management processes. The guide also outlines the role of manufacturers and health delivery organizations in securing medical devices.
The Healthcare and Public Health Sector Coordinating Council (HSCC) has released guidance on supply chain cybersecurity risk management. The primary audience of the guidance are non-IT professionals and enterprise leaders who are responsible for supply chain relationships in healthcare organizations. It provides tools and recommends policies regarding the security of products and services in small and medium-sized organizations.
Microsoft and the National Institute of Standards and Technology (NIST) are working together to develop a new guide that makes enterprise patch management easier. The project will focus on building common enterprise patch management reference architectures and processes. The results are expected to be shared in the NIST Special Publication 1800 practice guide after the relevant vendors validate the implementation instructions in the NCCoE lab.
The Australian government has introduced new telco regulations to prevent phone scams. The Australian Communications and Media Authority (ACMA) will release an action plan for this in November 2019. ACMA has been given time till the end of April 2020 to ensure all telcos comply with the new regulations.
The Bad
With a number of databases exposing data and an underground store getting hacked, this week saw several security compromises. BriansClub, a large underground store for hacked online credit card data was compromised, resulting in 26 million card records getting stolen again. Click2Mail, an email service provider, fell victim to a data breach possibly impacting 200,000 users. In other news, over 500 million UC Browser Android users were exposed to man-in-the-middle (MiTM) attacks because of an unauthorized Android Package Kit (APK) download.
One of the largest underground stores for stolen online credit card data, BriansClub, was hacked. The trove contained more than 26 million credit and debit records that have been stolen from retailers in the past 4 years. This data could allow hackers to create fake cards to illegally purchase goods from stores.
Email service provider Click2Mail suffered a data breach potentially affecting 200,000 users. The compromised information may include names, email addresses, phone numbers, account mailing addresses, and organization names. Hackers used the stolen information to send spam email to Click2Mail customers.
More than 500 million UC Browser Android users have been exposed to man-in-the-middle (MiTM) attacks because of an Android Package Kit (APK) download. This download was from a third-party server over unprotected channels. This violates Google’s policy that requires apps distributed via Google Play to modify, replace, or update only through Google Play’s mechanism.
Unsecured AWS servers belonging to two online recruitment firms, Authentic Jobs and Sonic Jobs, have exposed over 250,000 CVs. Authentic Jobs leaked 221,130 CVs while Sonic Jobs leaked at least 29,202 CVs. The potentially compromised information includes names, phone numbers, job histories, and addresses.
A public data tool belonging to the Philadelphia Department of Public Health exposed medical data of thousands of patients who were diagnosed with hepatitis. The exposed records included names, Social Security Numbers, addresses, and intimate health information. The data was taken down immediately after the department was notified.
Pitney Bowes was hit by a malware attack that encrypted data on its systems and disrupted access to its services. The attack impacted the firm’s mailing system products and online accounting reports. The company has so far found no evidence of any impact on customer data or accounts.
One of France’s biggest TV channels, M6 Group, suffered a ransomware attack that reportedly impacted its phone lines and email servers. The company’s radio and TV channels did not experience any downtime and remained operational as usual. The infection was contained with the assistance of the company’s cybersecurity professionals.
Hackers launched a cyberattack against Alphabroder, the largest supplier of promotional apparel in North America. The attack involved the Sodinokibi ransomware that encrypted the company’s data disrupting services. The company said that no customer data or account information was compromised.
An unsecured Whirlpool database exposed 28 million records containing information from IoT home devices. The exposed data includes customer emails, model names, and numbers, smart application ID numbers, and scanned appliance attributes, among others. This Mongo database was pulled offline a day after Whirlpool was notified about it.
Security researchers have discovered a data leak that exposed 2 terabytes of data hosted on an Elastic Server. This leak potentially impacted the personal and account details of 3.5 million users of the Pouringpounds and Cashkaro cashback sites, both belonging to Pouring Pounds Ltd. The exposed information includes names, phone numbers, email addresses, login credentials, bank details, IP addresses, and emails from Pouringpounds to its users.
Almost 768 websites, including a few with sensitive configurations, were found to be exposed via Laravel’s debug mode. It is said that many developers failed to disable the debug mode in Laravel, an open-source PHP framework to develop web applications. This error has exposed backend website details including credentials, database locations, and secret keys.
New Threats
Security experts brought various malware strains, vulnerabilities, and exploits to the spotlight this week. A security bypass flaw was discovered impacting Sudo, a popular Linux command. Researchers discovered a new malvertising campaign distributing Nemty 1.6 ransomware, the new variant of the infamous Nemty malware, via RIG exploit kit. Meanwhile, the US Department of Defense and HackerOne announced that US Cyber Command’s ‘Hack the Proxy’ bug bounty program discovered more than 30 vulnerabilities.