Infosec News 20191227

  • Publicado: Sex, 27/12/2019 - 10:02

Top News


  • Biggest Malware Threats of 2019

"2019 was another banner year for bots, trojans, RATS and ransomware. "

Link

TLP1 : Green

  • Marketing Agency Temporarily Halts Operations after Ransomware Attack

"A marketing agency announced just days before Christmas that it would be temporarily suspending operations as it works to recover from a ransomware attack."

Link

TLP1 : Green

  • Foreign Police Want to Bypass Privacy Laws—and Courts—to Get Data from Abroad: Year in Review 2019

"The global nature of the Internet means that police agencies all around the world facing challenges investigating crime when the data is stored in other countries. The pressure to make this process easier is mounting."

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • Thai Officials confirmed the hack of prison surveillance cameras and the video broadcast

"Authorities in Thailand are investigating a cyber attack that resulted in the broadcast of surveillance video from inside a prison in the country’s south."

Link

TLP1 : Green

  • Man accused of hiring hitman on dark web to kill ex-girlfriend

"Reports suggest that in mid-2018 someone using the alias Mastermind365 accessed the Dark Web site titled Camorra Hitmen and requested for kidnapping the 20-year old science fiction writer Alexis Stern."

Link

TLP1 : Green

  • Cyber-Attack Grounds Flights in Alaska

"RavnAir Group was forced to ground flights on Saturday following a cyber-attack on the Alaskan company's computer network."

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • Leaked Data Set Reveals Individual Tracking of 12 Million Phones

"The New York Times has obtained a massive data set of over 50 billion location pings linked to more than 12 million phones which illustrates the ease with which tech companies can track and identify individuals."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Chinese Hackers Bypassing Two-Factor Authentication

"Interesting story of how a Chinese state-sponsored hacking group is bypassing the RSA SecurID two-factor authentication system."

Link

TLP1 : Green

  • Ryuk Ransomware evolution avoid encrypting Linux folders

"Experts spotted a new strain of the Ryuk Ransomware that was developed to avoid encrypting folders commonly seen in *NIX operating systems."

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • HSTS For Forensics: You Can Run, But You Can't Use HTTP

"HSTS is a HTTP header which a web server can send to tell a client that they should not accept unencrypted communications from that domain for a specified period of time."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • Reverse Engineering Emotet

"Emotet is a Trojan that is primarily spread through spam emails. The infection may arrive either via malicious script, macro-enabled document files, or malicious links."

Link

TLP1 : Green

 

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp