April 1, 2022

Fortify Security Team
Apr 1, 2022

Title: EU Draft Law Adds Security Checks to all Crypto Transactions

Date Published: April 1, 2022


Excerpt: “The European Parliament has taken the first steps for new legislation against money-laundering that covers cryptocurrency transactions, which are an important part of illicit activities today. Members of the European Parliament from the Committee on Economic and Monetary Affairs (ECON) and the Committee on Civil Liberties (LIBE) have agreed on adopting (with 93 votes in favor, 14 against, and 14 abstentions) draft legislation for more transparent crypto asset transactions.”

Title: AcidRain, a Wiper that Crippled Routers and Modems in Europe

Date Published: April 1, 2022

Excerpt: “Security researchers at SentinelLabs have spotted a previously undetected destructive wiper, tracked as AcidRain, that hit routers and modems and that was suspected to be linked to the Viasat KA-SAT attack that took place on February 24th, 2022.”

Title: Belarusian ‘Ghostwriter’ Actor Picks Up BitB for Ukraine-Related Attacks

Date Published: March 31, 2022


Excerpt: “Ghostwriter – a threat actor previously linked with the Belarusian Ministry of Defense – has glommed onto the recently disclosed, nearly invisible “Browser-in-the-Browser” (BitB) credential-phishing technique in order to continue its ongoing exploitation of the war in Ukraine.”

Title: Spring4Shell: No need to Panic, but Mitigations are Advised

Date Published: March 31, 2022

Excerpt: “Security teams around the world got another shock on Thursday when news of disclosure of a PoC for an unauthenticated RCE zero-day vulnerability in Spring Core, a massively popular framework for building modern Java-based enterprise applications, began circulating online.”

Title: Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Date Published: March 31, 2022


Excerpt “On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes.”

Title: Critical Bugs in Rockwell PLC Could Allow Hackers to Implant Malicious Code

Date Published: April 1, 2022


Excerpt: “Two new security vulnerabilities have been disclosed in Rockwell Automation’s programmable logic controllers (PLCs) and engineering workstation software that could be exploited by an attacker to inject malicious code on affected systems and stealthily modify automation processes. The flaws have the potential to disrupt industrial operations and cause physical damage to factories in a manner similar to that of Stuxnet and the Rogue7 attacks, operational technology security company Claroty said.”

Title: Microsoft adds Windows 11 Upgrade Block due to IE11 Known Issue

Date Published: April  1, 2022


Excerpt: “Microsoft has added a new safeguard hold blocking Windows 11 upgrades for Windows 10 customers who don’t import their Internet Explorer 11 (IE11) data into Microsoft Edge before trying to install the newest Windows version. “After upgrading to Windows 11, saved information and data from Internet Explorer 11 (IE11) might not be accessible if you did not accept to import it into Microsoft Edge before the upgrade,” Microsoft explained in the Windows health dashboard.”

Title: Zyxel Fixes a Critical Bug in its Business Firewall and VPN Devices

Date Published: April 1, 2022


Excerpt: “Networking equipment vendor Zyxel has pushed security updates for a critical flaw, tracked as CVE-2022-0342 (CVSS 9.8), that affects some of its business firewall and VPN products. The vulnerability can be exploited to take control of the devices.”

Title: Apple Rushes Out Patches for 0-Days in MacOS, iOS

Date Published: April 1, 2022


Excerpt: “Apple rushed out patches for two zero-days affecting macOS and iOS Thursday, both of which are likely under active exploitation and could allow a threat actor to disrupt or access kernel activity. Apple released separate security updates for the bugs – a vulnerability affecting both macOS and iOS tracked as CVE-2022-22675 and a macOS flaw tracked as CVE-2022-22674. Their discovery was attributed to an anonymous researcher.”

Title: North Korean Hackers Distributing Trojanized DeFi Wallet Apps to Steal Victims’ Crypto

Date Published: April 1, 2022


Excerpt: “The North Korean state-backed hacking crew, otherwise known as the Lazarus Group, has been attributed to yet another financially motivated campaign that leverages a trojanized decentralized finance (DeFi) wallet app to distribute a fully-featured backdoor onto compromised Windows systems.”

Recent Posts

June 10, 2022

Title: Bizarre Ransomware Sells Decryptor on Roblox Game Pass Store Date Published: June 9, 2022 https://www.bleepingcomputer.com/news/security/bizarre-ransomware-sells-decryptor-on-roblox-game-pass-store/ Excerpt: “A new ransomware is taking the unusual approach of...

June 9, 2022

Title: New Symbiote Malware Infects all Running Processes on Linux Systems Date Published: June 9, 2022 https://www.bleepingcomputer.com/news/security/new-symbiote-malware-infects-all-running-processes-on-linux-systems/ Excerpt: “A newly discovered Linux malware known...

June 8, 2022

Title: Surfshark, ExpressVPN pull out of India Over Data Retention Laws Date Published: June 7, 2022 https://www.bleepingcomputer.com/news/legal/surfshark-expressvpn-pull-out-of-india-over-data-retention-laws/ Excerpt: “Surfshark announced today they are shutting down...

June 6, 2022

Title: Italian City of Palermo Shuts Down all Systems to Fend off Cyberattack Date Published: June 6, 2022 https://www.bleepingcomputer.com/news/security/italian-city-of-palermo-shuts-down-all-systems-to-fend-off-cyberattack/ Excerpt: “The municipality of Palermo in...

June 3, 2022

Title: Critical Atlassian Confluence Zero-Day Actively Used in Attack Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/critical-atlassian-confluence-zero-day-actively-used-in-attacks/ Excerpt: “Hackers are actively exploiting a new Atlassian...

June 2, 2022

Title: Conti Ransomware Targeted Intel Firmware for Stealthy Attacks Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/conti-ransomware-targeted-intel-firmware-for-stealthy-attacks/ Excerpt: “Researchers analyzing the leaked chats of the...

June 1, 2022

Title: Ransomware Attacks Need Less Than Four Days to Encrypt Systems Date Published: June 1, 2022 https://www.bleepingcomputer.com/news/security/ransomware-attacks-need-less-than-four-days-to-encrypt-systems/ Excerpt: “The duration of ransomware attacks in 2021...