Another Cloud Storage Leak Exposes Verizon IT Files

Security researchers have found yet another Amazon S3 storage container with sensitive data that was publicly accessible to anyone on the internet. The S3 bucket contained around 100MB of data, including internal files, usernames, passwords and email messages from U.S. telecommunications provider Verizon Wireless. Many of the files were associated with an internal middleware application
Read more

CCleaner Supply Chain Attack Targeted Technology Companies

New evidence shows the hackers who infected the installers for the popular CCleaner system optimization tool were primarily targeting the program’s business users. There are also links between the malware code and a well-known Chinese cyber-espionage group. The malware-infected installers for 32-bit versions of CCleaner and CCleaner Cloud released in August were installed on more
Read more

Like Equifax, Thousands of Companies Use Vulnerable Apache Struts Versions

U.S. credit monitoring bureau Equifax has been heavily criticized for its failure to patch a known critical vulnerability in the Apache Struts web development framework, an oversight that led to a massive data breach affecting 143 million people. A new report shows that poor patch management practices are common in enterprise environments and that Equifax
Read more

Attackers Use Undocumented Word Feature to Fingerprint Victims’ Software

Attackers are taking advantage of an undocumented feature in Microsoft Word to gather information about potential victims by using seemingly harmless documents that have no active code embedded in them. The technique was discovered by researchers from Kaspersky Lab in OLE2-formatted documents distributed as attachments to spearphishing emails. The files abused a feature called INCLUDEPICTURE
Read more

Equifax Confirms Hackers Broke In Through Apache Struts Flaw

U.S. credit reporting bureau Equifax confirmed Wednesday that the theft of personal information of more than 143 million consumers from its systems in May was the result of a vulnerability in the Apache Struts framework. The culprit was not the critical Struts REST plugin vulnerability patched recently, as some unsubstantiated reports suggested over the past
Read more

Insecure Elasticsearch Nodes Host Malware Command-and-Control Servers

More than 4,000 misconfigured Elasticsearch nodes, most of them running on Amazon Web Services’ platform, have been hijacked by attackers to host malware command-and-control servers. The compromised nodes were discovered by researchers from security firm Kromtech Alliance, who were researching Elasticsearch servers that had been configured by their owners to be publicly accessible without authentication.
Read more

BlueBorne Attack Can Compromise Bluetooth-Enabled Devices

Phones, tablets, smart watches, computers, TVs, medical devices, wearables and other internet-of-things devices could be in danger of getting hacked because of vulnerabilities in the Bluetooth implementations of major operating systems. The attack vector has been dubbed BlueBorne. Researchers from an IoT security firm called Armis have found critical vulnerabilities in the Bluetooth stacks used
Read more

Dragonfly Cyberspy Group Ramps Up Attacks Against Energy Sector

Symantec warns that a sophisticated cyberespionage group known as Dragonfly is aggressively targeting companies from the energy sector in Europe and the United States. The company’s researchers have seen evidence that in some cases the group obtained access to operational control systems. Dragonfly has been operating since 2011 and has significantly ramped up its attacks
Read more
Page 1 of 212