Skip to content

Gotham Security Daily Threat Alerts

by on September 16, 2014

September 15, Softpedia – (International) Twitch chat malware spreads, wipes dry Steam accounts. Researchers at F-Secure identified a piece of malware known as Eskimo that is being spread through a fake raffle invitation in’s chat feature. The page used for the fake raffle sign-up drops the Windows binary that can take screenshots as well as take control of the client for gaming service Steam to add friends, trade or sell items, and buy items if funds are available. Source:

September 15, Help Net Security – (International) Freenode suffers breach, asks users to change their passwords. IRC network Freenode notified users that it experienced a security breach September 13 and advised all users to change their passwords as a precaution. Source:

September 15, Securityweek – (International) Vulnerabilities found in website of Google-owned Nest. A security researcher identified and reported several security vulnerabilities in the Web site of home automation company Nest, including a file upload vulnerability that could allow attackers to upload a shell and gain access to personal and financial details of Nest customers. Google stated that the issue was addressed by restricting access to the affected domain and redirecting visitors to a different domain. Source:

September 12, Threatpost – (International) Four vulnerabilities patched in IntegraXor SCADA. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued an advisory September 11 advising users of Ecava Sdn Bhd’s IntegraXor supervisory control and data acquisition (SCADA) server software to patch their systems after four remotely exploitable vulnerabilities were discovered. The software is primarily used for industrial automation in firms managing railways, sewage systems, telecommunications, and heavy engineering. Source:

September 15, Help Net Security – (International) Dragonfly malware targeting pharmaceutical companies. Belden and RedHat Cyber researchers determined the Dragonfly (Havrex) malware is likely targeting pharmaceutical companies after findings uncovered that the malware contained an Industrial Protocol Scanner module that searched for devices often found in consumer packaged goods industries and that the Dragonfly attack is similar in nature to the Epic Turla campaign, among other findings. Source:

From → Security

Comments are closed.

%d bloggers like this: