<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 10/21/2020

SHARE

Breaches

Brute force attacks increase due to more open RDP ports

While leaving your back door open while you are working from home may be something you do without giving it a second thought, having unnecessary ports open on your computer is a security risk that is sometimes underestimated. That's because an open port can be subject to brute force attacks. A brute force attack is where an attacker tries every way he can think of to get in. Including throwing the kitchen sink at it. In cases where the method they are trying is to get logged in to your system. READ MORE...

Hacking

Montreal's STM public transport system hit by ransomware attack

Montreal's Société de transport de Montréal (STM) public transport system was hit with a RansomExx ransomware attack that has impacted services and online systems. On October 19th, STM suffered an outage that affected its IT systems, website, and customer support. While these outages did not affect the operation of buses or metro systems, people with disabilities who rely on STM's door-to-door paratransit service are affected as it uses an online registration system. READ MORE...


Google's Waze Can Allow Hackers to Identify and Track Users

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it. A security researcher has discovered a vulnerability in Google's Waze app that can allow hackers to identify people using the popular navigation app and track them by their location. Security DevOps engineer Peter Gasper discovered an API flaw in the navigation software that allowed him to track the specific movements of nearby drivers in real time. READ MORE...

Malware

TrickBot malware under siege from all sides, and it's working

The Trickbot malware operation is on the brink of completely shutting down following efforts from an alliance of cybersecurity and hosting providers targeting the botnet's command and control servers. Initial disruption actions seemed to leave the botnet unphased as its operators were able to rebuild the infrastructure and the network of infected computers. Although the battle is not over yet, the latest score in the fight against Trickbot clearly shows that the work of the coalition headed by Microsoft's Digital Crimes Unit (DCU) has had a serious impact. READ MORE...

Information Security

'MuddyWater' spies suspected in attacks against Middle East governments, telecoms

One of the most prolific cyber-espionage groups linked to Iran has used old tricks - and perhaps a new hacking tool - in dozens of attempts to breach government and telecommunications operators in the Middle East in recent months, security researchers said Wednesday. The hacking attempts have hit organizations in Iraq, Kuwait, Turkey and the United Arab Emirates, according to researchers at security provider Symantec. Iran has strategic interests in all of those countries. READ MORE...


GravityRAT Spyware Targets Android & MacOS in India

The Trojan once used in attacks against Windows systems has been transformed into a multiplatform tool targeting macOS and Android. Researchers have identified GravityRAT, a spying remote access Trojan (RAT) known to target devices in India, in an attack campaign against Android and MacOS devices. The activity was still ongoing at the time their findings were published on Oct. 19. GravityRAT has been active since at least 2015 and primarily focused on Windows operating systems. READ MORE...

Exploits/Vulnerabilities

Chinese Hackers Target Cisco Discovery Protocol Vulnerability

Chinese state-sponsored hackers are targeting a Cisco Discovery Protocol vulnerability that was disclosed earlier this year, the networking giant and the U.S. National Security Agency revealed on Tuesday. An advisory published by the NSA on Tuesday lists 25 vulnerabilities that have been exploited or targeted by threat actors believed to be sponsored by Beijing. The list includes several vulnerabilities that were not known to have been targeted, including CVE-2020-3118, which impacts Cisco products. READ MORE...


Preventing cybersecurity's perfect storm

Zerologon might have been cybersecurity's perfect storm: that moment when multiple conditions collide to create a devastating disaster. Thanks to Secura and Microsoft's rapid response, it wasn't. Zerologon scored a perfect 10 CVSS score. Threats rating a perfect 10 are easy to execute and have deep-reaching impact. Fortunately, they aren't frequent, especially in prominent software brands such as Windows. Still, organizations that perpetually lag when it comes to patching become prime targets. READ MORE...

Encryption

Lightning Network discloses "concerning" crypto vulnerabilities

The team behind Lightning Network has released extensive details on the vulnerabilities that were discovered in the cryptocurrency protocol and its software implementations. Attackers could have exploited these vulnerabilities to cause DoS and to disrupt crypto transactions by intercepting "smart contracts" made between two parties. Lightning Network is a payment protocol that runs on top of blockchain-based cryptocurrencies like Bitcoin, Ethreum, etc. READ MORE...

Science & Culture

Darkside ransomware donates $20K of extortion money to charities

The operators of Darkside ransomware have donated some of the money they made extorting victims to nonprofits Children International and The Water Project. They explain this Robin Hood move as an effort to make the world a better place and plan to make more donations in the future, but anonymously. Darkside emerged on the ransomware scene in August this year, targeting corporate networks and asking between $200,000 and $2 million for the file decryption key. READ MORE...

On This Date

  • ...in 1879, After 14 months of testing, Thomas Edison first demonstrates his electric lamp, hoping to one day compete with gaslight.
  • ...in 1940, Ernest Hemingway's novel For Whom the Bell Tolls is published.
  • ...in 1961, Bob Dylan records his first album in a single day at a cost of $400.
  • ...in 1994, North Korea and the US sign an agreement requiring North Korea to halts its nuclear weapons program and agree to international inspections.