Skip to content

Gotham Security Daily Threat Alerts

by on April 1, 2015

March 30, nj.com – (International) FBI investigates cyber attack that crippled Rutgers internet service. Federal law enforcement is helping to find the source of the weekend cyber attack that crippled Rutgers University internet service, a university spokesman confirmed Monday. “Rutgers is working with the FBI to investigate the incident,” spokesman E.J. Miranda said in an email to NJ Advance Media. Miranda added that the university’s Office of Information Technology continues to work to fully restore internet service. Source

March 30, nj.com (International) Cyber attack hits Fairleigh Dickinson; Rutgers works to restore internet service. As Rutgers University works to recover from a weekend cyber attack, Fairleigh Dickinson University officials confirm that a similar attack shut down the university’s own computer network Saturday. Dina Schipper, director of university public relations, confirmed that the university was hit with a denial of service attack on Saturday. Both the Teaneck and Florsham Park campuses were affected, Schipper said. Source

March 27, Softpedia – (International) GitHub has been under a continuous DDoS attack in the last 24 hours. The GitHub website suffered a minor service outage March 26, and has been mitigating a sustained distributed denial-of-service (DDoS) attack on its servers that has lasted over 24 hours. Administrators reported that connectivity resumed to normal after the attack was amplified March 27, and are continuing to monitor for any abnormalities. Source

March 26, Threatpost – (International) GE fixes buffer overflow bug in DTM library. General Electric released a patch for a vulnerability in device type management (DTM) libraries affecting five Highway Addressable Remote Transducer (HART) digital communication devices deployed in various critical infrastructure areas, including one manufactured by MACTek. The vulnerability allows an attacker to execute arbitrary code by causing a buffer overflow in the product’s DTM and crashing the Field Device Tool (FDT) Frame Application. Source

March 27, CSO Online – (International) DDOS attacks less frequent last year, more dangerous. San Francisco-based Black Lotus Communications released a report which found that the total number of distributed denial-of-service (DDoS) attacks declined steadily in 2014, but increased in packet size by 3.4 times in the third quarter, and average attack size by 12.1 gigabits per second (Gbps) in the fourth quarter. The report also identified an increase in complex, hybrid network and application-layer attacks. Source

March 26, Securityweek – (International) Thousands of hijacked WordPress sites redirect users to exploit kits. Security researchers at Germany’s Computer Emergency Response Team (CERT-Bund) discovered that at least 3,000 Web sites have been compromised by a local file inclusion (LFI) vulnerability in the Slider Revolution WordPress plugin that allows attackers to take control of sites by accessing and downloading files from the affected server. Many victims are directed to exploit kit landing pages, including Angler and Fiesta, which can inject various ransomware, fraud malware, and trojan malware into affected systems. Source

March 27, Securityweek – (International) U.S. offers $3 million reward for alleged Russian cybercriminals. The U.S. Department of State announced rewards totaling $3 million March 26 for information leading to the arrest or conviction of 2 Russian nationals believed to be key members in the Carder.su operation, in which participants created and trafficked identification documents and payment cards and perpetrated financial fraud and identity theft, causing losses of at least $50 million. Thirty members involved in the operation have been convicted, and 25 remaining are fugitives or pending trial. Source

March 26, SC Magazine – (International) Vulnerability found in popular hotel routers. Cylance researchers discovered an authentication flaw in the firmware of several models of InnGate routers that are commonly used by hotels and convention centers that can be exploited to distribute malware to guests, monitor and record data sent over the network, and possibly gain access to a hotel’s reservation and keycard system. The vulnerability was detected in 277 devices in 29 countries, including more than 100 devices located in the U.S. Source

From → Security

Comments are closed.

%d bloggers like this: