Last week on Malwarebytes Labs, we gave readers an FYI on multiple breaches that affected Humble Bundle, Quora, and Dunkin’ Donuts, to name a few. This follows the announcement from Marriott about a four-year long breach that impacted half a billion of its patrons.
We also pushed out the report, “Under the Radar: The Future of Undetected Malware”, wherein we examined current threats and the technologies that are unprepared for them. You can download the report directly here.
Lastly, we discovered a new Mac malware, which has the combined the capabilities of the Empyre backdoor and the XMRig miner, and reported about a new Adobe Flash zero-day vulnerability that was used against a Russian facility in a targeted attack campaign.
Other cybersecurity news:
- Mining software isn’t just for cryptocurrency—it could also be used to steal corporate secrets. Troy Kent, a researcher at Awake Security, revealed in a conference presentation that cybercriminals are using mining software to steal sensitive corporate data and information. (Source: CNBC)
- US iOS users targeted by massive malvertising campaign. ScamClub, a little-known online criminal group, hijacked 300 million browser sessions to redirect visitors to adult sites and gift card scams via malicious code planted inside ads they serve. (Source: ZDNet)
- Making a ransomware payment? It may now violate US sanctions. Those affected by ransomware in the US have a slimmer chance of getting their data back. The US government began penalizing individuals and organizations for paying ransomware threat actors. (Source: Bleeping Computer)
- Small businesses lose $80,000 on average to cybercrime annually, Better Business Bureau says. In the 2017 State of Cybersecurity Among Small Businesses in North America report, the Better Business Bureau claimed that in 2019, cybercrime will cost the global economy more than $2 trillion. (Source: Small Business Trends)
- This phishing scam group built a list of 50,000 execs to target. Agari discovered a list of 50,000 execs put together by a CEO fraud group they call London Blue. Agari believes the list is a reference for future business email compromise (BEC) attacks. (Source: ZDNet)
- New twist to grandparent scam: mail cash. In a report, the Federal Trade Commission (FTC) warned users of the growing trend of seniors age 70 and above getting conned for sending money to people pretending to be their grandchild. (Source: The FTC)
- Syrian Electronic Army hackers are targeting Android phones with Fake WhatsApp attacks. The Syrian Electronic Army (SEA) shifted its resources and attention to an Android spyware tool called SilverHawk. SilverHawk is introduced to target devices by pretending to be fake updates of communication apps that protect user privacy, like WhatsApp and Telegram. (Source: Forbes)
- Malicious Chrome extension which sloppily spied on academics believed to originate from North Korea. “Stolen Pencil.” This was the name researchers dubbed the hacking campaign that had been targeting academic institutions since mid-2018. The method of the attack itself is uncommon, as it used a malformed Google Chrome extension. (Source: Tripwire’s The State of Security Blog)
- Zoom patches serious video conferencing bug. Zoom, a popular video conferencing tool for businesses, was found to have a bug that, once exploited, can give attackers the ability to take control of computers participating in a conference call. Zoom already patched the bug. (Source: Sophos’s Naked Security Blog)
- Consumers believe social media sites pose greatest risk to data. According to a survey conducted by Gemalto, a majority of privacy-conscious Internet users believe that websites, particularly social media sites and bank sites, are not protecting their data adequately. Many of those surveyed also blame businesses for any data breaches and would likely walk away from them and/or act against them. (Source: Help Net Security)
Grab your shovels, dust off the snow blower, and bundle up. The way patches are accumulating this month is making me think of winter in Minnesota. I’m talking about the kind where the snow flurries start and stop so many times over the course of a few weeks, you suddenly realize there is a lot of snow out there! So the question is, do you shovel in small amounts when there are breaks in the … More
The post December Patch Tuesday forecast: Let it snow, let it snow, let it snow appeared first on Help Net Security.
Adobe has released an out-of-band security update for Flash Player that fixes two vulnerabilities, one of which is a zero-day (CVE-2018-15982) that has been spotted being exploited in the wild. About the vulnerability (CVE-2018-15982) CVE-2018-15982 is a use-after-free in the Flash’s file package com.adobe.tvsdk.mediacore.metadata that can be exploited to deliver and execute malicious code on a victim’s computer. It was flagged on November 29 by researchers with Gigamon Applied Threat Research (ATR) and Qihoo 360 … More
For the past couple of years, Office documents have largely replaced exploit kits as the primary malware delivery vector, giving threat actors the choice between social engineering lures and exploits or a combination of both.
While today’s malicious spam (malspam) heavily relies on macros and popular vulnerabilities (i.e. CVE-2017-11882), attackers can also resort to zero-days when trying to compromise a target of interest.
In separate blog posts, Gigamon and 360 Core Security reveal how a new zero-day (CVE-2018-15982) for the Flash Player (version 126.96.36.199 and earlier) was recently used in targeted attacks. Despite being a brand new vulnerability, Malwarebytes users were already protected against it thanks to our Anti-Exploit technology.
The Flash object is embedded into an Office document disguised as a questionnaire from a Moscow-based clinic.
Since Flash usage in web browsers has been declining over the past few years, the preferred scenario is one where a Flash ActiveX control is embedded in an Office file. This is something we saw earlier this year with CVE-2018-4878 against South Korea.
Victims open the booby-trapped document from a WinRAR archive that also contains a bogus jpeg file (shellcode) that will be used as part of the exploitation process that eventually loads a backdoor.
As Qihoo 360 security researchers noted, the timing with this zero-day attack is close to a recent real-world incident between Russia and Ukraine. Cyberattacks between the two countries have been going on for years and have affected major infrastructure, such as the power grid.
Malwarebytes users were already protected against this zero-day without the need to update any signatures. We detect the malware payload as Trojan.CrisisHT.APT.
Adobe has patched this vulnerability (security bulletin APSB18-42) and it is highly recommended to apply this patch if you are still using Flash Player. Following the typical exploit-patch cycle, zero-days often become mainstream once other attackers get their hands on the code. For this reason, we can expect to see this exploit integrated into document exploit kits as well as web exploit kits in the near future.
The post New Flash Player zero-day used against Russian facility appeared first on Malwarebytes Labs.
Naked Security - Sophos
Adobe has released a Flash Player update that plugs a critical vulnerability (CVE-2018-15981) that could lead to remote code execution, and is urging users to implement it as soon as possible. The flaw affects Flash Player 188.8.131.52 and earlier versions on Windows, macOS, Linux and Chrome OS, and details about it are already publicly available, the company warned. About CVE-2018-15981 CVE-2018-15981 was discovered and publicly disclosed by researcher Gil Dabah last week. “The interpreter code … More
The post Adobe plugs critical RCE Flash Player flaw, update ASAP! Exploitation may be imminent appeared first on Help Net Security.