Page 5 - Threat Intelligence 12-9-2019
P. 5

Security News












        Iranian hackers deploy new ZeroCleare data-wiping malware. Security researchers from IBM said today they
        identified a new strain of destructive data-wiping malware that was developed by Iranian state-sponsored
        hackers and deployed in cyber-attacks against energy companies active in the Middle East. IBM did not name
        the companies that have been targeted and had data wiped in recent attacks. Instead, IBM's X-Force security
        team focused on analyzing the malware itself, which they named ZeroCleare.

                Source: https://www.zdnet.com/article/iranian-hackers-deploy-new-zerocleare-data-wiping-malware/



        Global Cops Shut 31,000 Domains in IP Crackdown. Global police have shut down nearly 31,000 domains as
        part of a crackdown on IP infringement. Law enforcers from 18 EU member states including the UK joined
        forces with Europol, the US National Intellectual Property Rights Coordination Center, Eurojust and Interpol as
        part of operation IOS X. The 30,506 domains in question were apparently associated with selling a range of
        counterfeit and pirated items: from pharmaceuticals, software and electronics to movies, TV streaming and
        music.

                Source: https://www.infosecurity-magazine.com/news/global-cops-shut-31000-domains-in/



        Researchers disclose DLL loading vulnerabilities in Autodesk, Trend Micro, Kaspersky software. Researchers
        have disclosed a set of security vulnerabilities in Autodesk, Trend Micro, and Kaspersky software. On Monday,
        the SafeBreach Labs published three security advisories describing the bugs, all of which were privately
        reported to the vendors before public disclosure. The first vulnerability, tracked as CVE-2019-15628, impacts
        Trend Micro Maximum Security version 16.0.1221 and below. One of the software's components, the Trend
        Micro Solution Platform service, coreServiceShell.exe, runs as NT AUTHORITY\SYSTEM with high levels of
        permission, and it was this executable that the researchers targeted.
                Source: https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-
                software/



        Law Enforcement Shuts Down Imminent Monitor Malware, Makes Arrests. Law enforcement agencies from
        numerous countries have shut down the Imminent Monitor Remote Access Trojan (RAT) and have arrested
        thirteen of its most prolific users. In an operation led by the Australian Federal Police (AFP) and other law
        enforcement agencies, the site for Imminent Monitor was seized and users who used the software to illegally
        take over computers were arrested.

                Source:  https://www.bleepingcomputer.com/news/security/law-enforcement-shuts-down-imminent-
                monitor-malware-makes-arrests/












                                                    www.accumepartners.com
                                                                                                                     5
   1   2   3   4   5   6   7   8   9   10