Page 18 - Threat Intelligence 11-27-2019
P. 18

Macy’s online store compromised in Magecart-style attack. The webshop of noted U.S. department store
        company Macy’s has been compromised and equipped with an information-stealing JavaScript, which ended
        up collecting users’ personal and payment card information for a week. According to the notice sent by Macy’s
        to affected customers, the breach was discovered on October 15, 2019, after they were alerted to a suspicious
        connection between macys.com and another website. An unnamed researcher told Bleeping Computer that
        the info-stealing script was included in a legitimate one on the website and that it sent the submitted
        information to a C&C server at Barn-x.com/api/analysis.php. The stolen information includes customers’ first
        and last name, full address, phone number, email address, payment card number, security code and expiration
        date, but only if these were typed into the two aforementioned webpages.

                Source: https://www.helpnetsecurity.com/2019/11/19/macys-online-store-compromised/



        Retailer Orvis.com Leaked Hundreds of Internal Passwords on Pastebin. Orvis, a Vermont-based retailer that
        specializes in high-end fly fishing equipment and other sporting goods, leaked hundreds of internal passwords
        on Pastebin.com for several weeks last month, exposing credentials the company used to manage everything
        from firewalls and routers to administrator accounts and database servers, KrebsOnSecurity has learned. Orvis
        says the exposure was inadvertent, and that many of the credentials were already expired.

                Source: https://krebsonsecurity.com/2019/11/retailer-orvis-com-leaked-hundreds-of-internal-
                passwords-on-pastebin/




        San Marcos city computer systems hacked. Computer systems at the city of San Marcos were hacked last
        week, in an attack that has interfered with email accounts and other internal functions, but has not resulted in
        data breaches, city officials said.  “An external, malicious entrance to our system occurred on October 24,” city
        spokeswoman Robin Rockey stated in an email Thursday. Rockey said the city doesn’t know who was
        responsible for the cyber-attack, but is working with the San Diego County Sheriff’s Department, FBI and
        California Joint Powers Authority Insurance to investigate it. Officials also didn’t say whether the attack
        appears to be domestic or foreign. Most internal systems were affected, she said. City email accounts were
        disabled, and messages sent to the city were returned with the notices “Delivery Delayed: report of hack on
        San Marcos city systems.” However, she said, sensitive data wasn’t affected and there were no financial losses,
        other than the time spent addressing the problem.
                Source:  https://www.sandiegouniontribune.com/communities/north-county/story/2019-10-31/san-
                marcos-city-computer-systems-hacked



        Cyber-attack hits Utah wind and solar energy provider. sPower, a Utah-based renewable energy provider, is in
        the unenvied posture of holding two unwanted titles. First, the company is the first-ever US provider of solar
        and wind renewable energy to have been the victim of a cyber-attack. Second, the company is the first US
        power grid operator that is known to have lost connection with its power generation installations as a result of
        a cyberattack. According to a Freedom of Information Act (FOIA) request the site filed with the Department of
        Energy (see a copy here, courtesy of Cyberscoop), on March 5, this year, an attacker used a vulnerability in a
        Cisco firewall to crash the device and break the connection between sPower's wind and solar power
        generation installations and the company's main command center.  The attack also didn't appear to be
        targeted in nature. The documents reveal that the hacker didn't continue their attack nor did they breach
        sPower's network following the initial exploit that crashed the unpatched firewall.
                Source: https://www.zdnet.com/article/cyber-attack-hits-utah-wind-and-solar-energy-provider/




                                                    www.accumepartners.com
                                                                                                                    13
   13   14   15   16   17   18   19   20   21   22   23