March 3, 2022

Fortify Security Team
Mar 3, 2022

Title: Russian Space Agency says Hacking Satellites is an Act of War
Date Published: March 2, 2022

https://www.bleepingcomputer.com/news/security/russian-space-agency-says-hacking-satellites-is-an-act-of-war/

Excerpt: “Russia will consider any cyberattacks targeting Russian satellite infrastructure an act of war, as the country’s space agency director said in a TV interview. Dmitry Rogozin, the current head of the Russian Roscosmos State Space Corporation, added that such attempts would also be considered crimes and investigated by Russia’s law enforcement agencies.”

Title: Ukrainian WordPress Sites Under massive complex attacks
Date Published: March 3, 2022

https://securityaffairs.co/wordpress/128613/cyber-warfare-2/ukrainian-wordpress-sites-attacks.html

Excerpt: “Cyber attacks are an important component of the military strategy against Ukraine, experts observed a spike in the attacks against Ukrainian WordPress sites since the beginning of the military invasion of the country. The attacks aimed at making the websites unreachable and causing fear and distrust in the Ukrainian government, WordPress security firm Wordfence reported.”

Title: TeaBot Trojan Haunts Google Play Store, Again
Date Published: March 2, 2022

https://threatpost.com/teabot-trojan-haunts-google-play-store/178738/

Excerpt: “The TeaBot banking trojan – also known as “Anatsa” – has been spotted on the Google Play store, researchers from Cleafy have discovered. The malware – designed to intercept SMS messages and login credentials from unwitting users – affected users of “more than 400 banking and financial apps, including those from Russia, China, and the U.S,” its report claims.”

Title: The Biggest Threat to ICS/OT is a Lack of Prioritization
Date Published: March 3, 2022

https://www.helpnetsecurity.com/2022/03/03/cyber-attackers-ot-ics/

Excerpt: “A SANS survey reveals that cyber attackers have demonstrated a robust understanding of operational technology (OT) and industrial control system (ICS) engineering and have conducted attacks that gain access and negatively impact operations and human safety.”

Title: Russia-Ukraine Cryptocurrency Scams Detected by Researchers
Date Published: March 2, 2022

https://www.bankinfosecurity.com/russia-ukraine-cryptocurrency-scams-detected-by-researchers-a-18651

Excerpt: “From how cybercriminals are setting up new schemes to common cybercrime scams launched against the blockchain, Information Security Media Group has compiled snippets of security-related news in the cryptocurrency sphere.”

Title: Hackers Who Broke Into NVIDIA’s Network Leak DLSS Source Code Online
Date Published: March 3, 2022

https://thehackernews.com/2022/03/hackers-who-broke-into-nvidias-network.html

Excerpt: “American chipmaking company NVIDIA on Tuesday confirmed that its network was breached as a result of a cyber attack, enabling the perpetrators to gain access to sensitive data, including source code purportedly associated with its Deep Learning Super Sampling (DLSS) technology.”

Title: Logan Health Cyberattack, Server Hack Leads to Data Access of 214K People
Date Published: March 2, 2022

https://www.scmagazine.com/analysis/breach/logan-health-cyberattack-server-hack-leads-to-data-access-of-214k-people

Excerpt: Logan Health Medical Center recently notified 213,543 patients, employees and business associates that their personal and health data was possibly accessed, after a sophisticated cyberattack on its IT systems led to the hack of a file server containing protected health information.”

Title: Researchers Devise Attack for Stealing Data During Homomorphic Encryption
Date Published: March 2, 2022

https://www.darkreading.com/application-security/researchers-devise-attack-for-stealing-data-during-homomorphic-encryption

Excerpt: “Researchers at North Carolina State University have developed what they claim is the first successful side-channel attack on an emerging security technology called homomorphic encryption, which allows operations to be performed on encrypted data. The technique will be presented on March 23 at the virtual DATE22 conference and involves a way to steal data even while it is in the process of being homomorphically encrypted. The lead author on the paper is Furkan Aydin, a doctoral student at NC State, and it was co-authored by three other researchers at the university.”

Title: Over 100,000 Medical Infusion Pumps Vulnerable to Years Old Critical Bug
Date Published: March 2, 2022

https://www.bleepingcomputer.com/news/security/over-100-000-medical-infusion-pumps-vulnerable-to-years-old-critical-bug/

Excerpt: “Data collected from more than 200,000 network-connected medical infusion pumps used to deliver medication and fluids to patients shows that 75% of them are running with known security issues that attackers could exploit. The findings reveal that tens of thousands of devices are vulnerable to six critical-severity flaws (9.8 out of 10) reported in 2019 and 2020.”

Title: Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products
Date Published: March 3, 2022

https://thehackernews.com/2022/03/critical-patches-issued-for-cisco.html

Excerpt: “Cisco this week shipped patches to address a new round of critical security vulnerabilities affecting Expressway Series and Cisco TelePresence Video Communication Server (VCS) that could be exploited by an attacker to gain elevated privileges and execute arbitrary code. The two flaws – tracked as CVE-2022-20754 and CVE-2022-20755 (CVSS scores: 9.0) – relate to an arbitrary file write and a command injection flaw in the API and web-based management interfaces of the two products that could have serious impacts on affected systems.”

Recent Posts

June 3, 2022

Title: Critical Atlassian Confluence Zero-Day Actively Used in Attack Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/critical-atlassian-confluence-zero-day-actively-used-in-attacks/ Excerpt: “Hackers are actively exploiting a new Atlassian...

June 2, 2022

Title: Conti Ransomware Targeted Intel Firmware for Stealthy Attacks Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/conti-ransomware-targeted-intel-firmware-for-stealthy-attacks/ Excerpt: “Researchers analyzing the leaked chats of the...

June 1, 2022

Title: Ransomware Attacks Need Less Than Four Days to Encrypt Systems Date Published: June 1, 2022 https://www.bleepingcomputer.com/news/security/ransomware-attacks-need-less-than-four-days-to-encrypt-systems/ Excerpt: “The duration of ransomware attacks in 2021...

May 31, 2022

Title: Microsoft Shares Mitigation for Office Zero-Day Exploited in Attacks DatePublished: May 31, 2022 https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-mitigation-for-office-zero-day-exploited-in-attacks/ Excerpt: “Microsoft has shared mitigation...

May 31, 2022

Title: Microsoft Shares Mitigation for Office Zero-Day Exploited in Attacks DatePublished: May 31, 2022 https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-mitigation-for-office-zero-day-exploited-in-attacks/ Excerpt: “Microsoft has shared mitigation...

May 6, 2022

Title: Google Docs Crashes on Seeing "And. And. And. And. And." Date Published: May 6, 2022 https://www.bleepingcomputer.com/news/technology/google-docs-crashes-on-seeing-and-and-and-and-and/ Excerpt: “A bug in Google Docs is causing it to crash when a series of words...

May 5, 2022

Title: Tor Project Upgrades Network Speed Performance with New System Date Published: May 5, 2022 https://www.bleepingcomputer.com/news/security/tor-project-upgrades-network-speed-performance-with-new-system/ Excerpt: “The Tor Project has published details about a...