<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 8/16/2021

SHARE

Top News

65 vendors affected by severe vulnerabilities in Realtek chips

A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips supplied by Realtek are used by almost all well-known manufacturers and can be found in VoIP and wireless routers, repeaters, IP cameras, and smart lighting controls - just to name a few. The list of affected hardware manufacturers includes AsusTEK, Belkin, D-Link, Edimax, Hama, Netgear and many more. READ MORE...

Hacking

Hacker claims to steal data of 100 million T-mobile customers

T-Mobile is actively investigating a data breach after a threat actor claims to have hacked T-Mobile's servers and stolen databases containing the personal data of approximately 100 million customers. The alleged data breach first surfaced on a hacking forum yesterday after the threat actor claimed to be selling a database for six bitcoin (~$280K) containing birth dates, driver's license numbers, and social security numbers for 30 million people. READ MORE...


Indra hacking group blamed for attack on Iranian railway system that trolled country's supreme leader

On 9 July, Iran's railroad system came under attack from hackers. The attackers posted messages on station departure boards warning of "long delay[s] because of cyberattack", and suggesting inconvenienced passengers call "64411" for more information. 64411 is reportedly the telephone number of the office of Ayatollah Ali Khamenei, Iran's supreme leader. READ MORE...


I was offered $500k as a thank-you bounty for pilfering $600m from Poly Network, says crypto-thief

The mysterious miscreant who exploited a software vulnerability in Poly Network to drain $600m in crypto-assets, claims the Chinese blockchain company offered them $500,000 as a reward for discovering the weakness. The miscreant claims Poly Networks offered the money as part of a "completely legal bounty reward," and the biz told him it believed the massive heist "is white hat behavior." However, it appears the thief won't accept the bounty, and may instead send back the rest of the digital dosh. READ MORE...

Trends

Half of US Hospitals Shut Down Networks Due to Ransomware

Nearly half (48%) of US hospitals have disconnected their networks in the past six months due to ransomware, according to a new study from Philips and CyberMDX. The Perspectives in Healthcare Security Report is based on interviews with 130 IT and cybersecurity hospital executives and biomedical engineers and technicians. The findings revealed the outsized impact ransomware continues to have on healthcare organizations after they battled a surge in attacks during the early months of the pandemic. READ MORE...

Malware

Colonial Pipeline reports data breach after May ransomware attack

Colonial Pipeline, the largest fuel pipeline in the United States, is sending notification letters to individuals affected by the data breach resulting from the DarkSide ransomware attack that hit its network in May. The company says that it "recently learned" that DarkSide operators were also able to collect and exfiltrate documents containing personal information of a total of 5,810 individuals during their attack. READ MORE...

Exploits/Vulnerabilities

Windows 365 exposes Microsoft Azure credentials in plaintext

A security researcher has figured out a way to dump a user's unencrypted plaintext Microsoft Azure credentials from Microsoft's new Windows 365 Cloud PC service using Mimikatz. Mimikatz is an open-source cybersecurity project created by Benjamin Delpy that allows researchers to test various credential stealing and impersonation vulnerabilities. READ MORE...


Voltage Glitching Attack on AMD Chips Poses Risk to Cloud Environments

Researchers have described a voltage glitching attack that shows AMD's Secure Encrypted Virtualization (SEV) technology may not provide proper protection for confidential data in cloud environments. The research was conducted by a team from the Technical University of Berlin (TU Berlin) and it was detailed in a paper published this week. SEV is often used in cloud environments. READ MORE...

On This Date

  • ...in 1954, film director and screenwriter James Cameron ("Titanic", "Avatar", "The Terminator", "Aliens") is born in Ontario, Canada.
  • ...in 1954, the first issue of "Sports Illustrated" is published by "Time" magazine publisher Henry Luce.
  • ...in 1958, all-time best-selling female recording artist Madonna Louise Ciccone, AKA Madonna, is born in Bay City, MI.
  • ...in 1962, original Beatles drummer Pete Best is dismissed from the band. His replacement: Ringo Starr.