<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 02/08/2021

SHARE

Breaches

Spotify Hit With Another Credential-Stuffing Attack

This marks the second credential-stuffing attack to hit the streaming platform in the last few months. Spotify suffered a credential-stuffing attack that used stolen credentials from some 100,000 user accounts, a security researcher discovered. This is the second credential-stuffing attack to affect the music platform in the past couple of months. Last November, 300,000 accounts were affected when an Elasticsearch database containing more than 380 million records and login credentials. READ MORE...


SitePoint hacked: Hashed, salted passwords pinched from web dev learning site via GitHub tool pwnage

SitePoint, an Australian learn-to-code publishing website, has been compromised while promoting the book Hacking for Dummies on its homepage. Reg reader Andy told us: "Got an email from SitePoint this morning saying that they had been hacked and some non-important (to them) stuff like names, email addresses, hashed passwords etc might have been stolen. Coincided with a big increase in spam that I've been getting but that's probably coincidence." READ MORE...

Hacking

Attackers Leverage Locally-Loaded Chrome Extension for Data Exfiltration

A recently investigated malicious attack was abusing a locally loaded Chrome extension to exfiltrate data and establish communication with the command and control (C&C) server. While the use of malicious Chrome extensions in attacks is not something new, this attack stands out from the crowd due to the use of 'Developer mode' in the browser to enable loading of a malicious extension locally. The extension was dropped in a folder on the compromised workstation, while the 'Developer mode' was enabled. READ MORE...


Microsoft to alert Office 365 users of nation-state hacking activity

Microsoft will soon notify Office 365 of suspected nation-state hacking activity detected within their tenants according to a new listing on the company's Microsoft 365 roadmap. Microsoft Defender for Office 365 (previously known as Office 365 Advanced Threat Protection or Office 365 ATP) provides Office 365 enterprise accounts with email protection against several types of threats including credential phishing and business email compromise, as well as automated attack remediation. READ MORE...


New phishing attack uses Morse code to hide malicious URLs

A new targeted phishing campaign includes the novel obfuscation technique of using Morse code to hide malicious URLs in an email attachment. Samuel Morse and Alfred Vail invented morse code as a way of transmitting messages across telegraph wire. When using Morse code, each letter and number is encoded as a series of dots (short sound) and dashes (long sound). Starting last week, a threat actor began utilizing Morse code to hide malicious URLs in their phishing. READ MORE...

Trends

Google Moves Away From Diet of 'Cookies' to Track Users

Google is weaning itself off user-tracking "cookies" which allow the web giant to deliver personalized ads but which also have raised the hackles of privacy defenders. Last month, Google unveiled the results of tests showing an alternative to the longstanding tracking practice, claiming it could improve online privacy while still enabling advertisers to serve up relevant messages. "This approach effectively hides individuals 'in the crowd' and uses on-device processing to keep a person's [...]" READ MORE...


Researchers develop approach that can recognize fake news

Social media is increasingly used to spread fake news. The same problem can be found on the capital market - criminals spread fake news about companies in order to manipulate share prices. Researchers at the Universities of Göttingen and Frankfurt and the Jožef Stefan Institute in Ljubljana have developed an approach that can recognize such fake news, even when the news contents are repeatedly adapted. In order to detect false information. READ MORE...

Malware

Android emulator abused to introduce malware onto PCs

Emulators have played a part in many tech-savvy users' lives. They introduce a level of flexibility that not only allows another system to run on top of a user's operating system-a Windows OS running on a MacBook laptop, for example-but also allows video gamers to play games designed to work on a different platform than the one they own. Recently, ESET revealed a campaign that targeted users of NoxPlayer, a popular Android emulator for PCs and Macs. READ MORE...

Information Security

FBI leaned on Dutch cops' hacking in Emotet disruption

U.S. and European law enforcement agencies last week conducted an extraordinary crackdown on Emotet, a botnet of infected computers that has defrauded victims of millions. The operation involved officials from nine governments, but one move was decisive: Dutch police used their cyber authorities to infiltrate Emotet infrastructure. They slipped a software update onto the servers that cut off communications between infected computers and the botnet, halting its spread. READ MORE...


Packaging Giant WestRock Says Ransomware Attack Hit Production

Atlanta-based packaging giant WestRock (NYSE: WRK) on Friday shared an update on the recent ransomware incident that impacted the company's information technology (IT) and operational technology (OT) systems. The company has been investigating the incident while working on restoring impacted systems. The response process has involved proactively shutting down certain systems and enhancing cybersecurity measures. The incident has impacted production. READ MORE...


New VS Code release hits stable channel for everyone who's not on Apple Silicon after last-minute bug found

Microsoft has pushed out another update to dev favourite Visual Studio Code, but opted to hold off on the Apple Silicon version after a last-minute bug reared its head. Those running Insider versions of the code wrangler on Apple hardware have access to three flavours: x64 for Intel-powered Macs, arm64 for Apple Silicon or universal, which should work natively on either. The universal option is a larger download since it includes code for both kinds of chip. READ MORE...

Science & Culture

Empowering a remote workforce is a top priority for CEOs

A top challenge for many CEOs over the next few years is managing a remote workforce, a new IBM Institute for Business Value (IBV) study reveals. CEOs of outperforming organizations - those who were in the top 20 percent for revenue growth of those surveyed - are prioritizing talent, technology and partnerships to position their companies for success post-COVID-19 pandemic. Empowering employees in the hybrid workplace. READ MORE...

On This Date

  • ...in 1914, comics writer Bill Finger, who created classic "Batman" villains like the Riddler, the Penguin, and the Joker, is born in Denver, CO.
  • ...in 1937, composer Joe Raposo, known for his work on "Sesame Street" ("Bein' Green", "Sing", "C is for Cookie") is born in Fall River, MA.
  • ...in 1955, attorney and best-selling legal thriller author John Grisham ("A Time To Kill", "The Firm") is born in Jonesboro, AR.
  • ...in 1971, the NASDAQ stock market index opens for the first time.