Infosec News 20210405

  • Publicado: Seg, 05/04/2021 - 09:22

Top News


  • 533 Million Facebook Users' Phone Numbers and Personal Data Leaked Online

"In what's likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular cybercrime forum for free—which was harvested by hackers in 2019 using a Facebook vulnerability."

Link

TLP1 : Green

  • One-Third of Organizations Take No Action After Detecting a Cyber Attack

"Sorin Mustaca's aggregated IT Security News and articles about information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, breaches."

Link

TLP1 : Green

  • Those Annoying Pop-Ups may be More Dangerous than You Think

"If you’ve done enough browsing, you’ve undoubtedly tried to navigate to a website only to be redirected to another page."

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • Criminals send out fake “census form” reminder – don’t fall for it!

"The server name used in the scam is obviously fake because it doesn’t end in .gov.uk, which is a controlled domain available only to official national, regional and local government bodies in the UK. "

Link

TLP1 : Green

  • US looks to keep critical sectors safe from cyberattacks

"A top Biden administration official says the government is undertaking a new effort to help electric utilities, water districts and other critical industries protect against potentially damaging cyberattacks."

Link

TLP1 : Green

  • Everthing VERYTHING You Need To Know About GERMANY’S Draft IT Security Law

"Germany’s draft security law has been a work in progress for about two years. Delayed by wrangling within the country’s ruling coalition, one of the main bones of contention has been how to politically determine that a vendor is trustworthy."

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • Ubiquiti Shares Dive After Reportedly Downplaying 'Catastrophic' Data Breach

"The personal data of over 500 million Facebook users has been posted online in a low-level hacking forum."

Link

TLP1 : Green

  • Poulight Trojan: A “txt file” can steal all your secrets

"The Poulight Trojan has been put into use since last year and has complete and powerful functions to steal information. This attack proved that it has begun to spread and use overseas."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Black Kingdom Ransomware Jumps on the Exchange Express

"When Microsoft announced that it discovered a state-sponsored threat group, Hafnium, was exploiting four separate zero-day vulnerabilities, the InfoSec community was already looking into their crystal ball... "

Link

TLP1 : Green

  • VMware vROps Flaws Can Provide 'Unlimited Opportunities' in Attacks on Companies

"A couple of serious vulnerabilities patched recently by VMware in its vRealize Operations (vROps) product can pose a significant risk to organizations, according to a researcher involved in the discovery of the security bugs."

Link

TLP1 : Green

  • Tens of thousands of QNAP SOHO NAS devices affected by unpatched RCEs

"Unpatched vulnerabilities in QNAP small office/home office (SOHO) network-attached storage (NAS) devices could be exploited by remote attackers to remotely execute arbitrary code."

Link

TLP1 : Green

  • [local] Rockstar Service - Insecure File Permissions

"Exploit Title: Rockstar Service - Insecure File Permissions # Date: 2020-04-02 # Exploit Author: George Tsimpidas # Software Link : https://socialclub.rockstargames.com/rockstar-games-launcher # Version Patch: 1.0.37.349"

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • Network Monitoring: The Forgotten Cybersecurity Tool

"In a cyber world filled with SIEMs, security appliances and anti-malware products, one would think that the specter of cybersecurity would be well under control. "

Link

TLP1 : Green

  • Cyber Threats Against Macs Are Increasing! Are You Prepared?

"Let’s get to the point immediately: if you use an Apple Mac system, it doesn’t mean that you are safe from cyber-attacks. If you don’t take the necessary actions to protect your Mac, you’re just one mistake away from an infected system."

Link

TLP1 : Green

  • Improve Data Utilization to Modernize the SOC

"If you want to modernize your SOC to focus on detection and response you need to start by capturing the right data. A central repository, continuously updated with new data and observations, and curated to ensure relevance, provides the foundation you need. The next challenge is improving data utilization by collaborating with the teams and organizations that make up your entire enterprise, to mitigate risk across your environment."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • Watson - Enumerate Missing KBs And Suggest Exploits For Useful Privilege Escalation Vulnerabilities

"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities."

Link

TLP1 : Green

  • After hack, officials draw attention to supply chain threats

"The U.S. government is working to draw attention to supply chain vulnerabilities, an issue that received particular attention late last year after suspected Russian hackers gained access to federal agencies and private corporations by sneaking malicious code into widely used software."

Link

TLP1 : Green

  • Wi-Fi Devices as Physical Object Sensors

"In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn wireless devices into sensors capable of gathering data about the people and objects bathed in their signals."

Link

TLP1 : Green

  • DefenderCheck - Identifies The Bytes That Microsoft Defender Flags On

"Quick tool to help make evasion work a little bit easier."

Link

TLP1 : Green

 

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp