Breaking News

Cybersecurity week Round-Up (2018, Week 8)

Cybersecurity week Round-Up (2018, Week 8) -Let’s try to summarize the most important event occurred last week in 3 minutes.

Last week, the Russian central bank revealed unknown hackers have stolen roughly $6 million from a Russian bank last year via SWIFT system.

The Indian City Union Bank announced that cyber criminals compromised its systems and transferred a total of US$1.8 million.

Hackers continue to show a great interest in cryptocurrency.

  • Researchers with Cisco Talos have monitored a bitcoin phishing campaign conducted by a criminal gang tracked as COINHOARDER that made an estimated $50 million by exploiting Google AdWords.
  • A criminal organization has made $3.4 million by compromising Jenkins servers and installing a Monero cryptocurrency miner dubbed JenkinsMiner.
  • Hackers compromised a Tesla Internal Servers with a Cryptocurrency miner.

Google Project Zero hackers disclosed details of an unpatched vulnerability in the Edge browser because Microsoft failed to address it within a 90-day deadline.

Google white hackers disclosed also critical vulnerabilities in uTorrent clients that could be easily exploited by the researchers to deliver a malware on the target computer or view the past downloads.

The former NSA hacker and malware researcher Patrick Wardle spotted a new remote access Trojan dubbed Coldroot RAT. The Coldroot RAT is a cross-platform malware that is targeting MacOS systems and the bad news is that AV software is not able to detect it.

Intel released a stable microcode update to address the Spectre vulnerability for its Skylake, Kaby Lake, and Coffee Lake processors in all their various variants.

State-sponsored hackers are often active and are expanding their horizons:

  • North Korean APT Group tracked as APT37 broadens its horizons targeting entities in Japan, Vietnam, and even the Middle East last year;
  • Russia-linked Sofacy APT group shift focus from NATO members to towards the Middle East and Central Asia;
  • Iran-linked group OilRig used a new Trojan called OopsIE in recent attacks against an insurance agency and a financial institution in the Middle East.

Researchers at Fortinet have discovered the OMG botnet, the first Mirai variant that sets up proxy servers on the compromised IoT devices.

SamSam Ransomware hit the Colorado Department of Transportation Agency that shut Down 2,000 Computers after the infection.

FBI warns of spike in phishing campaigns to gather W-2 information.

Enjoy the video 😉

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – cybersecurity, cyberweek)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.