Page 11 - Threat Intelligence 9-24-2019
P. 11

Internal Threats












        WeWork's Wi-Fi Exposed Files, Credentials, Emails. For years, sensitive documents and corporate data have
        been easily viewable on the coworking space's open network. WeWork's weak Wi-Fi security has been leaving
        sensitive data accessible on its open network for years. That may have compromised both organizations that
        work in WeWork spaces as well as those that have never entered WeWork but do business with companies
        that use its offices. A Fast Company report back in August highlighted poor security practices by the real estate
        firm, which rents out coworking spaces to mostly small businesses. A new report from CNET takes a deeper
        dive into the extent of WeWork's oversight and implications for its customers.
                Source:  https://www.darkreading.com/risk/weworks-wi-fi-exposed-files-credentials-emails/d/d-
                id/1335865



        Critical Vulnerability in D-link DNS-320 Devices let Hackers to Execute Remote Code and to Steal Data. D-link
        DNS-320 Devices have used as an ideal backup solution, it offers an effective way to share documents, music,
        videos, and photos with anyone that connected in your network. CyStack security researcher, Trung Nguyen,
        detected a remote code execution vulnerability in DNS-320 sharecenter devices that let the user’ s data
        vulnerable to remote hackers. The vulnerability can be tracked as CVE-2019-16057. The vulnerability resides in
        the login module of DNS-320 devices, by exploiting this vulnerability attackers could gain access to the devices
        remotely and control devices by executing arbitrary code

                Source: https://gbhackers.com/unauthenticated-rce-dns-320/



        Skidmap, Linux Malware Mining Cryptocurrency in Disguise. A new strain of Linux malware has been
        discovered by security researchers, which is configured to carry out a multitude of malicious activities besides
        just illegally mining cryptocurrency; by using a "secret master password" it provides hackers the universal
        access to the system. Skidmap, Linux malware demonstrates the increased convolutions in Cryptocurrency
        mining malware and prevalence of the corresponding threats. In order to carry out its cryptocurrency mining
        in disguise, Skidmap forges CPU-related statistics and network traffic, according to TrendMicro's recent blog on
        the subject. Highlighting the advanced methods used by Skidmap, researchers at TrendMicro said, "Skidmap
        uses fairly advanced methods to ensure that it and its components remain undetected. For instance, its use of
        LKM rootkits — given their capability to overwrite or modify parts of the kernel — makes it harder to clean
        compared to other malware.".

                Source: https://www.ehackingnews.com/2019/09/skidmap-linux-malware-mining.html

















                                                    www.accumepartners.com
                                                                                                                    11
   6   7   8   9   10   11   12   13   14   15   16