Page 11 - Threat Intelligence 12-20-2019
P. 11

Internal Threats












        SBI cautions against charging your phone at charging stations. India’s largest lender, State Bank of India (SBI)
        has warned customers against charging their phones at charging stations. The bank has advised the customers
        to think twice before plugging-in their phone at charging stations as malwares could infect their smartphone,
        thus in turn getting robbed off all their important data and passwords. Juice jacking, a USB charger scam could
        end up draining your bank account, the bank has warned. Juice jacking is a type of cyber attack involving a
        charging port that doubles as a data connection, typically over USB. This often involves either installing
        malware or surreptitiously copying sensitive data from a smartphone, tablet, or other computer device.
                Source: https://www.livemint.com/money/personal-finance/sbi-cautions-against-charging-your-phone-
                at-charging-stations-11575863675053.html



        New Mac Malware Hides in Memory and Masquerades as a Crypto App. So-called “fileless” malware is
        infecting Mac OS machines by hiding in memory and never touching files or drives. The malware,
        masquerading as a piece of crypto trading software called UnionCryptoTrader.dmg, is suspected to be the
        work of the North Korean hacking group, Lazurus APT. The malware infects Mac OS computers by injecting an
        executable file into the boot process, thereby hiding it from the user and rendering it difficult to remove. The
        executable then looks for various online payloads and runs them in memory, ensuring that anti-virus software
        could miss the malware after reboots and other OS events. Ultimately, there is very little for an anti-virus app
        to find as the payload changes over time and the malware has root privileges on infected machines.

                Source:  https://sg.finance.yahoo.com/news/mac-malware-hides-memory-masquerades-
                203000477.html




        Latest Microsoft Update Patches New Windows 0-Day Under Active Attack. With its latest and last Patch
        Tuesday for 2019, Microsoft is warning billions of its users of a new Windows zero-day vulnerability that
        attackers are actively exploiting in the wild in combination with a Chrome exploit to take remote control over
        vulnerable computers. Microsoft's December security updates include patches for a total of 36 vulnerabilities,
        where 7 are critical, 27 important, 1 moderate, and one is low in severity—brief information on which you can
        find later in this article. Tracked as CVE-2019-1458 and rated as Important, the newly patched zero-day
        Win32k privilege escalation vulnerability, reported by Kaspersky, was used in Operation WizardOpium attacks
        to gain higher privileges on targeted systems by escaping the Chrome sandbox. Although Google addressed
        the flaw in Chrome 78.0.3904.87 with the release of an emergency update last month after Kaspersky
        disclosed it to the tech giant, hackers are still targeting users who are using vulnerable versions of the browser.
                Source: https://thehackernews.com/2019/12/windows-zero-day-patch.html














                                                    www.accumepartners.com
                                                                                                                    11
   6   7   8   9   10   11   12   13   14   15   16