6 December 2022 Weekly Newsletter

BOCRA website

     

NEWSLETTER

 

Google Patches Ninth Chrome Zero-Day of 2022


                                                     LATEST CYBER HACKS 

 
 
icon

Hackers Selling Personal Data Of 150,000 Patients From TN Hospital On Dark Web

A report released by CloudSEK claims that patient data of Sree Saran Medical Centre in on sale by a threat actor. On November 22, 2022, CloudSEK discovered a post that advertised the sale of sensitive data sourced from Three Cube IT Lab India - a Chennai-based provider of business and consulting services.

icon

Cybersecurity incident' hits San Diego Unified computer network

The offices of San Diego Unified School District have experienced a computer-network security breach, SDUSD officials disclosed this week.

District Superintendent Lamont Jackson on Thursday sent a letter to his staff and families of students attending SDUSD campuses to apprise them of what he described as a "cybersecurity incident."

icon

Rackspace Shuts Down Hosted Exchange Systems Due to Security Incident

Cloud company Rackspace is investigating a cybersecurity incident that forced it to shut down its Hosted Exchange environment. Rackspace’s Hosted Exchange service, which makes it easier for organizations to use Microsoft Exchange servers for email, started experiencing problems on Friday, December 2. The company confirmed the problems early in the day and told customers that it had to shut down the Exchange environment due to what it described as “significant failure”.


                                                      VULNERABILITIES

 
 
icon

Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems

The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be potentially exploited to crash the program or trigger remote code execution.

icon

Attackers Target Vulnerable Redis Servers to Deliver Redigo Backdoor

Attackers are abusing a critical vulnerability in Redis software to deploy a new Go-based malware named Redigo. The vulnerability has a maximum severity rating (CVSS score: 10.0) and it is under active exploitation.


                                     MALWARES

 
 
icon

Android malware apps with 2 million installs spotted on Google Play

A new set of Android malware, phishing, and adware apps have infiltrated the Google Play store, tricking over two million people into installing them.

The apps were discovered by Dr. Web antivirus and pretend to be useful utilities and system optimizers but, in reality, are the sources of performance hiccups, ads, and user experience degradation.

icon

Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware

A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor's offices and courts.

"Although it disguises itself as a ransomware and extorts money from the victim for 'decrypting' data, [it] does not actually encrypt, but purposefully destroys data in the affected system," Kaspersky researchers Fedor Sinitsyn and Janis Zinchenko said in a write-up.


                              

icon

Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware

The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware.


                              


                               GENERAL NEWS

 
 
icon

When Being Attractive Gets Risky - How Does Your Attack Surface Look to an Attacker?

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams within an organization can ultimately impact the way an attacker sees the organization's assets, or in other words, the external attack surface. This dramatically increases the need to define an exposure management strategy.

 

icon

How companies time data leak disclosures

Every year the personal data of millions of people, such as passwords, credit card details, or health details, fall into the hands of unauthorized persons through hacking or data processing errors by companies.