From Security Weekly WikiJump to navigationJump to search
- Pandemic Spawned Record Breaking Cybercriminal Activity Cybersecurity firm, Bolster, published a report documenting an increase in phishing and website scams during the first quarter of 2020. 30% of the total Q1 scams were COVID-19 related.
- Iran-Linked Hackers Recently Targeted Coronavirus Drug maker Gilead Hackers linked to Iran have targeted staff at U.S. drug maker Gilead Sciences Inc in recent weeks.
- Twitter to Coronavirus Conspiracy Theorists: Stop Telling People to Burn Down 5G Towers Twitter says it will remove the most dangerous 5G-coronavirus tweets: Those that tell people to destroy 5G cellular towers in order to stop the virus.
- AA20-133A: Top 10 Routinely Exploited Vulnerabilities Top ten exploited vulnerabilities, by CVE #, and mitigations for each. Mitigations have a recurring theme of patch and follow security best practices.
- Academic data centers abused for crypto currency mining Indicators to help find and shutdown.
- USCYBERCOM Shares Five New North Korea-Linked Malware Samples The five new samples released Tuesday (one dated 2017 and four dated 2018) reportedly belong to the COPPERHEDGE RAT, the TAINTEDSCRIBE implant, and PEBBLEDASH implant.
- New Ramsay Malware Can Steal Sensitive Documents from Air-Gapped Networks Interesting as an academic exercise. The differences between the three strains are informative. This appears to share roots with the PLANEPATCH and Retro Malware strains. No information is provided on how the air-gap is crossed.
- Travelex Hackers Hit Celebrity Law Firm with Ransomware Grubman Shire Meiselas and Sacks has been hit by a ransomware attack conducted by the "REvil group" (aka Sodinokibi) that compromised some 756GB of data.
- Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases This latest research report focuses on reported widespread lack of proper configuration utilized in Google's Firebase databases, an issue which has received media coverage previously due to similar reports from security researchers.