29 Security breaches Worldwide – Week 13, 2019
Be informed about the latest 29 Security breaches Worldwide, identified and reported publicly during Week 13, 2019. As these security-related breaches have a severe negative impact on your business, consider a security AUDIT to prevent any similar cases.
- Ecommerce sites that support the PayPal Payflow Pro protocols could be subject to abuse of their underlying Magento software.
- Hackers were able to use $0 transactions with stolen credit card numbers to check whether the cards are still valid. Magento is recommending web app firewalls or bot detection systems to protect their servers. Hackers abuse Magento PayPal integration to test validity of stolen credit cards
- Korean government-sponsored researchers have discovered dozens of bugs in the LTE wireless protocol stack.
- They documented them here and classified the problems into improper error handling, replayed message attacks, poor encryption implementation and bypasses of security procedures. Hackers could leverage these bugs to take control over phones, send SMS phishes and deny services. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
- This post reviews the history of the NIST cybersecurity framework.
- Since it was created in 2014, it has gone through several revisions and improvements. It is widely used as a reference model for numerous organizations. 5 Years of the NIST Cybersecurity Framework
- Organizations need to do a better job of defending — and monitoring — non-standard IP ports.
- This and lots more data from Sonicwall’s instrumentation can be found in its latest report. It identified thousands of new malware variants daily across its sensor network. 2019 SONICWALL CYBER THREAT REPORT
- Last week’s news about the Norsk Hydro ransom attack has some updates.
- There is this statement from the company itself, which could serve as a template for what businesses should do in the future. They were transparent, took proactive measures to provide the details, set up a temp website and held daily media briefings to answer questions by their senior staff. They also had solid backups available so they didn’t have to pay the ransom. Update on cyber attacks March 21 and Click to start the webcast
- A security researcher collected used PCs from local pawn shops and found a staggering amount of personal data on their hard drives.
- For $600, he obtained dozens of computers, cell phones and hard disks. He ran each drive through his own scanning tool and found dozens of SSNs, email accounts, credit card numbers and even two passports. It’s Scary How Much Personal Data People Leave on Used Laptops and Phones, Researcher Finds
- Hackers replaced the Asus software update tool with their own.
- This enabled them to distribute backdoors in malware to hundreds of thousands of PCs last year. Motherboard broke the story. The attack was discovered and confirmed by researchers who found a supply chain campaign. It is being called Operation ShadowHammer. What is interesting is that only a few hundred of the infected Asus PCs had backdoors that were actually activated by the malware authors. Asus has not confirmed the problem. The story shows the length that different teams of researchers went to work together to identify the malware and how it was designed to be precisely targeted and well-hidden. Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers and Operation ShadowHammer
- The US agency FEMA has accidentally leaked the personal data of more than 2 million disaster survivors from its third-party contractor.
- This is according to an OIG report released last week. The contractor has since updated its access rules, and the report says no evidence of compromise has been yet found. FEMA ‘unnecessarily’ shared data of 2.3 million disaster victims with contractor
- The BokBot’s man-in-the-browser attack is dissected in this post.
- It shows its inner workings, how it managed certs and data flow, and how code is injected into the browser connection. Interception: Dissecting BokBot’s “Man in the Browser”
- This post takes a deep dive into what happened with the Marriott/Starwood breach from 2014-2018.
- Nearly 400 million guests’ private data was leaked, costing the hotel chain $3M. The chain has bad security practice, and worse response tactics. Autopsying the Marriott Data Breach: This is why insurance matters
- DDoS attacks declined during 4Q18, according to this report from NexusGuard.
- One attack against a single target was observed each day during December, demonstrating how determined adversaries are these days. Durations increased to 450 minutes on average. DDoS Threat Report 2018 Q4
- Another zero-day bug with another WordPress plug-in.
- This time it is Social Warfare, a social sharing tool that has more than 70,000 installs and more than 900,000 downloads. The issue allows a scripting attack that can provide remote access to your website. The plug-in has been fixed in v. 3.5.3 and users should update. Unpatched Zero-Day Vulnerability in Social Warfare Plugin Exploited In The Wild and WP SECURITY BULLETIN – MARCH 2019.
Discover trending and viral stories about Security breaches Worldwide. The remaining Security breaches made news headlines. All these happened just in the last 7 days.