Wednesday, May 12, 2021

Wormable Windows Bug Opens Door to DoS, RCE

Microsoft's May 2021 Patch Tuesday updates include fixes for four critical security vulnerabilities.

GitHub Prepares to Move Beyond Passwords

GitHub adds support for FIDO2 security keys for Git over SSH to fend off account hijacking and further its plan to stick a fork in the security bane of passwords.

Hackers Leverage Adobe Zero-Day Bug Impacting Acrobat Reader

A patch for Adobe Acrobat, the world’s leading PDF reader, fixes a vulnerability under active attack affecting both Windows and macOS systems that could lead to arbitrary code execution.

Fake Chrome App Anchors Rapidly Worming ‘Smish’ Cyberattack

An ingenious attack on Android devices self-propagates, with the potential for a range of damage.

Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud

Aamir Lakhani, researcher at FortiGuard Labs, discusses leading-edge threats related to edge access/browsers/IoT, and the COVID-19 vaccine, as a way of getting into larger organizations.

200K Veterans’ Medical Records Likely Stolen by Ransomware Gang

Analyst finds ransomware evidence, despite a contractor's denial of compromise.

DarkSide Wanted Money, Not Disruption from Colonial Pipeline Attack

Statement by the ransomware gang suggests that the incident that crippled a major U.S. oil pipeline may not have exactly gone to plan for overseas threat actors.

Colonial Pipeline’s Ransomware Attack Sparks Emergency Declaration

Security researchers mull possible perpetrators of the attack, and warned that the incident could be a harbinger of things to come. 

Lemon Duck Cryptojacking Botnet Changes Up Tactics

The sophisticated threat is targeting Microsoft Exchange servers via ProxyLogon in a wave of fresh attacks against North American targets.

Major U.S. Pipeline Crippled in Ransomware Attack

Colonial Pipeline Company says it is the victim of a cyberattack that forced the major provider of liquid fuels to the East Coast to temporarily halted all pipeline operations.

iPhone Hack Allegedly Used to Spy on China’s Uyghurs

U.S. intelligence said that the Chaos iPhone remote takeover exploit was used against the minority ethnic group before Apple could patch the problem.

80% of Net Neutrality Comments to FCC Were Fudged

NY's AG: Millions of fake comments – in favor and against – came from a secret broadband-funded campaign or from a 19-year-old's fake identities.

Qualcomm Chip Bug Opens Android Fans to Eavesdropping

A malicious app can exploit the issue, which could affect up to 30 percent of Android phones.

Critical Cisco SD-WAN, HyperFlex Bugs Threaten Corporate Networks

The networking giant has rolled out patches for remote code-execution and command-injection security holes that could give attackers keys to the kingdom.

Ryuk Ransomware Attack Sprung by Frugal Student

The student opted for “free” software packed with a keylogger that grabbed keystrokes and credentials later used to get into a biomolecular institute. 

Ryuk Ransomware Attack Sprung by Frugal Student

The student opted for “free” software packed with a keylogger that grabbed keystrokes and credentials later used to get into a biomolecular institute. 

Massive DDoS Attack Disrupts Belgium Parliament

A large-scale incident earlier this week against Belnet and other ISPs has sent a wave of internet disruption across numerous Belgian government, scientific and educational institutions.

Massive DDoS Attack Disrupts Belgium Parliament

A large-scale incident earlier this week against Belnet and other ISPs has sent a wave of internet disruption across numerous Belgian government, scientific and educational institutions.

New Crypto-Stealer ‘Panda’ Spread via Discord

PandaStealer is delivered in rigged Excel files masquerading as business quotes, bent on stealing victims' cryptocurrency and other info.

Anti-Spam WordPress Plugin Could Expose Website User Data

'Spam protection, AntiSpam, FireWall by CleanTalk' is installed on more than 100,000 sites -- and could offer up sensitive info to attackers that aren't even logged in.
The Register

Blessed are the cryptographers, labelling them criminal enablers is just foolish

Preserving privacy is hard. I know because when I tried, I quickly learned not to play with weapons Column  Nearly a decade ago I decided to try my hand as a cryptographer. It went about as well as you...
The Hacker News

Ransomware Gang Leaks Metropolitan Police Data After Failed Negotiations

The cybercrime syndicate behind Babuk ransomware has leaked more personal files belonging to the Metropolitan Police Department (MPD) after negotiations with the DC Police broke down, warning that they intend to publish all data ransom demands are not met. "The...
Security Affairs

NSA and ODNI analyze potential risks to 5G networks

U.S. Intelligence agencies warn of weaknesses in 5G networks that could be exploited by crooks and nation-state actors for intelligence gathering. The U.S. National Security Agency (NSA), along with the DHS Cybersecurity and Infrastructure Security Agency (CISA), and the Office...
The Hacker News

Alert: Hackers Exploit Adobe Reader 0-Day Vulnerability in the Wild

Adobe has released Patch Tuesday updates for the month of May with fixes for multiple vulnerabilities spanning 12 different products, including a zero-day flaw affecting Adobe Reader that's actively exploited in the wild. The list of updated applications includes Adobe Experience Manager,...
The Register

Beijing twirls ban-hammer at 84 more apps it says need to stop slurping excess data

Online lending apps and more given fifteen days to ‘rectify’ behaviour China’s Central Cyberspace Affairs Commission has named 84 apps it says breach local privacy laws and given their developers 15 days to “rectify” their code.…