Page 13 - Threat Intelligence 12-9-2019
P. 13

Web / Internet Threats















        New 'PyXie' RAT Used Against Multiple Industries. A new Python-based remote access Trojan (RAT) has been
        used in campaigns targeting a wide range of industries, BlackBerry Cylance revealed this week. Dubbed PyXie,
        the malware has been active since last year, but received little attention, although it has been observed in
        conjunction with Cobalt Strike beacons and a downloader seemingly linked to the Shifu banking Trojan.

                Source: https://www.securityweek.com/new-pyxie-rat-used-against-multiple-industries



        Ransomware Attack Forces Great Plains Health to EHR Downtime. Great Plains Health was hit with a
        ransomware attack on Monday night, forcing the Nebraska hospital to launch downtime procedures as it
        attempts to recover its IT systems, according to local news outlet KNOP News 2. The ransomware was first
        detected around 7PM on Monday, which was immediately identified by the information systems. Great Plains
        worked through the night to reduce the impact of the attack.

                Source:  https://healthitsecurity.com/news/ransomware-attack-forces-great-plains-health-to-ehr-
                downtime



        Kaspersky Security Bug Provides Hackers with Signed Code Execution. A security issue discovered in
        Kaspersky Secure Connection, which itself is bundled into a series of other Kaspersky security products, allows
        a malicious actor to obtain signed code execution, persistence, and even defense evasion in the case of more
        complex attacks. Detailed in CVE-2019-15689, the vulnerability enables hackers to run an unsigned executable
        though a signed version that is launched as NT AUTHORITY/SYSTEM, technically opening the door for further
        malicious activities on the compromised device.

                Source: https://news.softpedia.com/news/kaspersky-security-bug-provides-hackers-with-signed-code-
                execution-528427.shtml



        Smith & Wesson Online Store Affected by Magecart Attack. The online store for American gun manufacturer
        Smith & Wesson fell victim to a Magecart attack that’s designed to steal customers’ payment data. Willem de
        Groot of Sanguine Security learned that a particular Magecart group had been impersonating his employer and
        abusing his name as a contact to register domain names. While investigating this group, de Groot observed
        that the attackers had compromised Smith & Wesson’s online store before Black Friday with a script from
        live.sequracdn[.]net/storage/modrrnize.js.
                Source:  https://www.tripwire.com/state-of-security/security-data-protection/smith-wesson-online-
                store-affected-by-magecart-attack/












                                                    www.accumepartners.com
                                                                                                                    13
   8   9   10   11   12   13   14   15   16   17   18