Hack of DNA website exposes data from 92M accounts

Information Management Resources

MyHeritage received a message from a researcher who unearthed a file named 'myheritage' containing email addresses and encrypted passwords of nearly all of its users on a private server outside the company. Hacking Data security Cyber security Cyber attacks

B0r0nt0K ransomware demands $75,000 ransom to the victims

Security Affairs

The ransom encrypts all files and renames them by appending. rontok extension to the file names. According to the popular malware researcher Michael Gillespie , when the B0r0nt0K ransomware encrypts a file it will base64 the encrypted data.

A new Shamoon 3 sample uploaded to VirusTotal from France

Security Affairs

” In the attempt to deceive the victims, attackers used the internal file name “Baidu PC Faster” and the “Baidu WiFi Hotspot Setup” in the description of the file.

Hacker breached Perceptics, a US maker of license plate readers

Security Affairs

Last week, a hacker that goes online with the moniker ‘Boris Bullet-Dodger’ reported the hack to The Register and showing it a list of files as proof of the attack.

Sony Bravia Smart TVs affected by a critical vulnerability

Security Affairs

“This application handles file names incorrectly when the user uploads a media file. ” The third flaw directory-traversal vulnerability tracked as CVE-2018-16594 that relates to the way the Photo Sharing Plus app handles file names. The application handles file names incorrectly when receiving a user’s input file via uploading a URL. A attacker can upload an arbitrary file with a crafted file name (e.g.: /./)

New variant of Dridex banking Trojan implements polymorphism

Security Affairs

In attacks observed on June 17, the malware was using 64-bit DLLs with file names loaded by legitimate Windows system executables. Duncan pointed out that file paths, file names, and associated hashes would change at every computer login.

Victims of Planetary Ransomware can decrypt their files for free

Security Affairs

Researchers at Emsisoft developed a decryptor for the Planetary Ransomware family that could allow victims to decrypt their files for free. The latest variant of the Planetary malware appends the.mira extension to the names of the encrypted files. The ransom note, named !!!READ_IT!!!

Emsisoft released a free Decrypter for JSWorm 2.0

Security Affairs

ransomware, thanks to experts at Emsisoft they can decrypt their file for free. Researchers found notable callouts in two different malware samples naming ID Ransomware and several prominent malware researchers: “:HI SIRI, DEMONSLAY AND AMIIIIGO!!! “Its files have the “.[ID-<numbers>][<email>].JSWORM”

Crooks exploit exposed Docker APIs to build AESDDoS botnet

Security Affairs

“A batch file first executes the WinEggDrop scanner (s.exe), which tries port 2375 on various hosts with Chinese IP address ranges specified in the ip.txt file.”

Trends 106

Malware researchers decrypted the Qrypter Payload

Security Affairs

This messages warned the users about imminent summons against them, inviting them to read the attached lawsuit, a not so innocent looking file named “ Avviso del tribunale.jar ”. The JAR file seems to be corrupted due to the absence of some classes. Encrypted file content.

Cr1ptT0r Ransomware targets D-Link NAS Devices and embedded systems

Security Affairs

Once the malware has infected a system drops two plain text files, one is a ransom note called “_FILES_ENCRYPTED_README.txt,” which gives information to the victim on what has happened and instruction to pay the ransom. The second text file named “_cr1ptt0r_support.txt”

Researcher disclosed a Windows zero-day for the third time in a few months

Security Affairs

The last Windows zero-day flaw disclosed by SandboxEscaper is an arbitrary file read vulnerability that could be exploited by a low-privileged user or a malicious program to read the content of any file on a Windows system.

The SLoad Powershell malspam is expanding to Italy

Security Affairs

A new malspam campaign hit Italy in this days, threat actors are spreading a new variant of a powerful downloader named sLoad. As usual, it comes as a zip file attached to an e-mail, this file contains two elements: A fake shortcut to directory (.lnk

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

Security Affairs

The flaw is an “Absolute Path Traversal” issue in the library that could be exploited to execute arbitrary code by using a specially-crafted file archive. The malicious code allows the attackers to download and execute files on the infected machine.

AESDDoS bot exploits CVE-2019-3396 flaw to hit Atlassian Confluence Server

Security Affairs

Trend Micro researchers also discovered that the latest variant of the AESDDoS bot can modify files i.e., /etc/ rc. local , as an autostart technique by appending the {malware path } /{malware file name} reboot command. A new variant of the AESDDoS bot is exploiting a recent vulnerability in the Atlassian collaborative software Confluence.

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Security Affairs

The following graph shows different types of threats that were distributed with this approach, the Shade ransomware was the most common one: Compromises websites delivering the Shade/Troldesh ransomware, included three types of files, namely HTML, ZIP, and EXE files masquerading as.jpg images.

CMS 114

Shade Ransomware is very active outside of Russia and targets more English-speaking victims

Security Affairs

The ransomware also drops on the Desktop 10 text files, named README1.txt through README10.txt, “Attention! All the important files on your disks were encrypted. The details can be found in README.txt files which you can find on any of your disks.”

Nansh0u campaign already infected 50,000 MS-SQL and PHPMyAdmin Servers

Security Affairs

Once successfully logged in with administrative privileges, threat actors execute a sequence of MS-SQL commands that allow them to download malicious payload from a remote file server and execute it with SYSTEM privileges. start”) in the name of the script initiating port scans.”

STOP ransomware encrypts files and steals victim’s data

Security Affairs

“These tasks include showing a fake Windows Update screen, disabling Windows Defender, and blocking access to security sites by adding entries to Windows’s HOSTS file.” The post STOP ransomware encrypts files and steals victim’s data appeared first on Security Affairs.

Severe bug in LibreOffice and OpenOffice suites allows remote code execution

Security Affairs

The security researcher Alex Inführ discovered a severe remote code execution vulnerability in LibreOffice and Apache OpenOffice that could be exploited by tricking victims into opening an ODT (OpenDocument Text) file embedding an event embedded.

Events 108

The Long Run of Shade Ransomware

Security Affairs

The phishing email contains a.zip file named “slavneft.zakaz.zip”, which means something like “slavneft order” in English, showing a direct reference to “Slavneft”. It contains a russian speaking JavaScript file named “«??? «??? «?????????» ??????????? ??????”,

A month later Gamaredon is still active in Eastern Europe

Security Affairs

Hash 5555a3292bc6b6e7cb61bc8748b21c475b560635d8b0cc9686b319736c1d828e Threat Gamaredon Pteranodon implant Brief Description SFX file Ssdeep 24576:PXwOrRsTyuURQFsVhIe74lpyevrM4vZxn6k1gQ Guo:PgwRAyuURQ2/1YpyeT7ok8. Information about initial SFX file. Script content in “ 15003.cmd ” file.

No Bates, No Problem for Native Files: eDiscovery Throwback Thursdays

eDiscovery Daily

So, it was probably accurate when I stated that “it seems to ‘upset the legal apple cart’ when attorneys have to contemplate applying Bates numbers to native files.” This enables you to uniquely identify each native file, and still correlate the native file with pages when printed.”.

New NRSMiner cryptominer NSA-Linked EternalBlue Exploit

Security Affairs

The new version of NRSMiner updates existing infections by downloading new modules and removing files and services installed by old previous versions. This malicious code first installs a service named snmpstorsrv , with snmpstorsrv.dll registered as servicedll.

Mining 104

TA505 is expanding its operations

Security Affairs

Hash 0c88e285b6fc183c96b6f03ca5700cc9ca7c83dfccc6ad14a946d1868d1cc273 Threat Dropper Brief Description Excel file with malicious macro Ssdeep 3072:Mc38TehYTdeHVhjqabWHLtyeGxml8/dgzxXYhh3vVYwrq 8/P5HKuPF1+bkm13Kkf:B38TehYTdeHVhjqabWHLty/xml8/dgNr. Files contained in “wprgxyeqd79.exe” (SFX).

IT 77

How to deliver malware using weaponized Microsoft Office docs embedding YouTube video

Security Affairs

“This attack is carried out by embedding a video inside a Word document, editing the XML file named document.xml, replacing the video link with a crafted payload created by the attacker which opens Internet Explorer Download Manager with the embedded code execution file” The experts created a proof-of-concept attack using a YouTube video link embedded in weaponized Microsoft Office documents.

Video 87

Shared Drive Cleanup Success Story

The Texas Record

Over the years, staff had tried to maintain order by naming folders by the record type listed on the retention schedule, using idiosyncratic naming conventions, and attempting to create high level folders for staff to save their files in. Creation of README Files (PDF).

Spotting RATs: Delphi wrapper makes the analysis harder

Security Affairs

The spread of threats exploiting ISO image to hide themselves is helped by the Windows functionality, introduced since Windows 8, which allows the user to easily mount this file type through a double-click on it.

How to Get and Set Up a Free Windows VM for Malware Analysis

Lenny Zeltser

Select “MSEdge on Win 10 (x64)” and pick the virtualization platform that matches the one you have: If using macOS, you might be unable to extract the zip file’s contents unless you download a file extractor such as The Unarchiver.

Epson ScanSmart Accounting Edition Software Now Available Across Scanner Portfolio

Document Imaging Report

Epson’s ScanSmart Software Accounting Edition 2 offers powerful productivity features such as automatic file naming, automatic receipt recognition with accurate OCR and easy integration with QuickBooks ® , TurboTax and Quicken. LONG BEACH, Calif. – 17, 2019 – Epson America, a leading provider of digital imaging solutions, today unveiled its updated ScanSmart Software 1 , now available with Epson’s ScanSmart Software Accounting Edition 2 upgrade for receipt scanning capabilities.

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

The threat is only detected later when an MSI file (Windows installer) drops and execute the first infection stage of the malware. After the Excel document is opened (xls file), the content it displays will lure the user to execute malicious Excel 4.0 File name: Binary._D7D112F049BA1A655B5D9A1D0702DEE5

Thousands of Mega account credentials leaked online, it is credential stuffing

Security Affairs

Thousands of account credentials associated with the popular file storage service Mega have been published online, The former NSA hacker Patrick Wardle, co-founder at Digita Security , discovered in June a text file containing over 15,500 usernames, passwords, and files names. Found file on VirusTotal w/ 15K+ Mega accounts (user names/passwords & users' file listings). File listings included files names describing child abuse content.

CVE-2019-2725 Oracle WebLogic flaw exploited in cryptojacking campaign

Security Affairs

The malware used in this campaign hides its malicious codes in certificate files to evade detection. “It then employs the component CertUtil, which is used to manage certificates in Windows, to decode the file.” The downloaded file is then deleted using cmd.

OSX/Linker, a new piece of Mac malware that exploits Gatekeeper bypass

Security Affairs

An attacker can create a ZIP file containing a symbolic link to an automount endpoint under their control and send it to the victim. The disk image files were either an ISO 9660 image with a.dmg file name, or an actual Apple Disk Image format.dmg file.

Mekel 2.0 Adds Features for Maximum Production Efficiencies

Document Imaging Report

Additionally, serpentine scanning requires less movement of the platen, thereby elongating the life of the hardware. · OCR title naming (all models) : The optical character recognition (OCR) function recognizes title bar (microfiche) or title image (microfilm) text. Frederick, Md. –

New Gallmaker APT group eschews malware in cyber espionage campaigns

Security Affairs

“These lure documents use titles with government , military, and diplomatic themes, and the file names are written in English or Cyrillic languages.

Common File Storage Mistakes

Armstrong Archives

The following will discuss some of the most effective strategies that companies can implement to streamline their file storage processes. While seemingly simple in concept, the wrong type of file boxes has the potential to make the filing process more complicated than it should be.

Experts warn of fake Adobe Flash update hiding a miner that works as a legitimate update

Security Affairs

” The fake Adobe Flash updates use file names starting with AdobeFlashPlayer that are hosted on cloud-based web servers that don’t belong to Adobe. One such example from December 2017 named free-mod-menu-download-ps3.exe also shows osdsoft[.]com

Sofacy APT group used a new tool in latest attacks, the Cannon

Security Affairs

Hackers used weaponized files named ‘crash list (Lion Air Boeing 737).docx’ Sofacy APT group (aka APT28 , Pawn Storm , Fancy Bear , Sednit , Tsar Team, and Strontium ) has a new weapon in its arsenal dubbed Cannon.

Tools 90

[SI-LAB] LockerGoga is the most active ransomware that focuses on targeting companies

Security Affairs

LockerGoga ransomware is a crypto-malware that loads the malicious file on the system from an infected email attachment. This ransomware’s name is based on the path used for compiling the source code into an executable that was discovered by MalwareHunterTeam.