Skip to content

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Gotham Security Daily Threat Alerts

by on June 15, 2015

June 12, Softpedia – (International) 44.5 million new malware variants recorded in 1 month. Symantec released findings from a report revealing that new malware variants increased by over 50 percent in May to 44.5 million, that the most commonly seen threat on the Apple OS X operating system (OS) was a trojan virus that changes the domain name system settings of affected computers, and that medium-sized companies were the most frequently targeted by spear-phishing attacks. Source

June 12, Softpedia – (International) Apple fixed a nasty MitM vulnerability in the latest watchOS. Security researchers from Zimperium Mobile Security discovered that Apple Watch users running watchOS 1.0 are vulnerable to man-in-the-middle attacks dubbed “DoubleDirect” in which threat actors can leverage Internet Control Message Protocol (ICMP) redirects from the device and gateway to potentially steal credentials and deliver malicious payloads that could spread to devices on an entire corporate network. Source

June 11, Softpedia – (International) Encryption keys hard-coded in industrial access point. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) reported an unpatched vulnerability in the firmware code of N-Tron 702W industrial-level wireless access point systems in which an attacker could use secure shell (SSH) to remotely intercept encryption keys and communication from the device. Source

June 11, Softpedia – (International) Fileless malware makes almost 200,000 victims mostly in the U.S. Security researchers at Symantec discovered that cybercriminals used a Microsoft Windows zero-day vulnerability permitting arbitrary remote file execution to spread Poweliks malware to 198,500 computers, almost all of which were in the U.S. Poweliks resides in system memory and is primarily used for ad-fraud purposes. Source

June 11, Softpedia – (International) CryptoWall 3.0 delivered in campaign started more than a week ago. Security researchers from Cisco’s TALOS discovered an active malicious email campaign purporting to be regarding possible employment including hypertext markup language (HTML) attachments that redirect users to Google Drive accounts hosting the CryptoWall ransomware. Source

June 11, Securityweek – (International) Only few organizations patched recent Honeywell SCADA flaw: researchers. Security researchers from Outpost24 reported that 90 Honeywell Falcon XLWeb supervisory control and data acquisition (SCADA) control systems, most located in Europe and the Middle East, remain unpatched and are vulnerable to directory traversal flaws in which an attacker could execute operating system (OS) commands. The experts believe that four of the systems analyzed could have been exploited. Source

June 11, Securityweek – (International) OpenSSL patches Logjam bug, DoS vulnerabilities. OpenSSL released patches for its open-source toolkit addressing the “Logjam” vulnerability in which an attacker could use a man-in-the-middle (MitM) attack to force transport layer security (TLS) connections to downgrade to weaker cryptography, as well as a denial-of-service (DoS) vulnerability caused by the way ECParameters structures are handled. Source

June 11, Associated Press – (Texas) Texas Medicaid patients have private data exposed online. The Texas Department of Aging and Disability Services reported June 11 that approximately 6,600 Medicaid recipients’ records containing personal identifiable information (PII) and treatment information were compromised in a data breach discovered in April 2015 after an internal Web application was made public. The Web site was taken down, and none of the information has been misused. Source

June 10, Business Wire – (Indiana) Medical Informatics Engineering notifies patients of a data security compromise. Medical Informatics Engineering announced June 10 it had been targeted by a sophisticated cyber-attack which compromised the sensitive health information of patients affiliated with several of its clients, including Concentra, Fort Warne Neurological Center, Franciscan St. Francis Health Indianapolis, Gynecology Center, Inc. Fort Wayne, and Rochester Medical Group, as well as clients associated with the company’s subsidiary NoMoreClipboard. The incident is currently under investigation. Source

June 11, Boston State House News Service – (Massachusetts) Auditor: 12 agencies failed to properly handle sensitive computer records. An audit of 12 Massachusetts State agencies released June 11 uncovered a failure to comply with State requirements regarding the removal of sensitive information from electronic equipment. State agencies faulted included the Office of the Chief Medical Examiner, The Massachusetts State Police, the State Lottery Commission, the Department of Public Health, and 8 others. Source

From → Security

Comments are closed.

%d bloggers like this: