Leonid is driving the adoption of Zero Trust concepts and cloud-native technologies across the enterprise security products portfolio in Symantec. He has delivered security products to leading enterprises worldwide.
August 26, 2019
For the latest discoveries in cyber research for the week of 26th August 2019, please download our Threat Intelligence Bulletin.
Top Attacks and Breaches
- Mastercard has disclosed a data breach that impacted customer data belonging to German and Belgian customers that were part of the company’s Priceless Specials program. The incident was discovered after files of the stolen data, which included credit card numbers as well as personal information, were published online.
- Over 20 Texas government organizations have been hit with ransomware in what appears to be a pre-coordinated attack against the entities. The cybercriminals behind the attack demanded $2.5 million in ransom to decrypt the data.
Check Point SandBlast Agent provides protection against this threat
- Employees of a nuclear power plant in Ukraine are suspected of abusing the systems of the power plant’s internal network to mine cryptocurrency. The employees allegedly connected some of the systems to the internet, exposing the sensitive internal network of the plant to security breaches.
- MoviePass, the popular movie ticket subscription service, left an exposed database online containing 161 million records of personal data, including unencrypted credit card details of its customers as well as other billing information and login credentials.
- Personal email addresses of over a million adult content website users were found exposed in an unsecured Elasticsearch database online. The database included full names for some of the users, as well as user activity logs.
- A hacker who carried out phishing attacks against hundreds of companies worldwide and sold their stolen data online has been ordered to pay back more than $1.1 million he earned in bitcoin and other cryptocurrencies. Among the attacked companies to receive compensation are Uber, Sainsbury’s, Groupon and T Mobile.
Vulnerabilities and Patches
- A heap buffer overflow vulnerability has been discovered in some versions of Squid web proxy cache servers. The vulnerability, tracked as CVE-2019-12527, may allow attackers to trigger a denial-of-service condition and execute arbitrary code on the vulnerable servers.
- A zero-day privilege-escalation vulnerability has been found in Steam client for Windows, affecting over 96 million users. The vulnerability may allow an attacker to run executables using Steam Client Service’s elevated permissions.
- Two severe vulnerabilities exist in all versions of the Kubernetes open-source system that may allow an unauthorized attacker to trigger a denial-of-service condition. Kubernetes has already released patched versions to address the issues.
Threat Intelligence reports
- An Android music app infected with AhMyth Remote-Access-Trojan has managed to bypass Google Play’s security mechanisms twice in the span of two weeks. The app is able to steal contacts, harvest files stored on the device and send SMS messages from it.
Check Point SandBlast Mobile provides protection against this threat
- Threat actors are cloning popular websites, and specifically, the NordVPN website, to distribute the Bolik banking Trojan. These actors were previously known for hacking into websites and hijacking download links to refer to their malware.
Check Point SandBlast provides protection against this threat
- A report uncovers the recent activity of Silence APT, a Russian-speaking group targeting financial organizations in former Soviet states. The group is expanding their geography and aggressively targeting banks in more than 30 countries all over the world, while also enhancing their arsenal.
- Researchers have uncovered the recent activity of APT41, the China-linked APT group, which is known for its financially motivated operations as well as state-sponsored espionage activity. The group was recently observed targeting a web server at a US-based research university, exploiting several vulnerabilities to compromise its systems and load different payloads.
Check Point Anti-Virus blade provides protection against this threat (Trojan.Win32.HIGHNOON)
Detecting Credit Card Skimmers
Modern credit card skimmers hidden in self-service gas pumps communicate via Bluetooth. There’s now an app that can detect them:
The team from the University of California San Diego, who worked with other computer scientists from the University of Illinois, developed an app called Bluetana which not only scans and detects Bluetooth signals, but can actually differentiate those coming from legitimate devices — like sensors, smartphones, or vehicle tracking hardware — from card skimmers that are using the wireless protocol as a way to harvest stolen data. The full details of what criteria Bluetana uses to differentiate the two isn’t being made public, but its algorithm takes into account metrics like signal strength and other telltale markers that were pulled from data based on scans made at 1,185 gas stations across six different states.
Posted on August 26, 2019 at 6:41 AM