Cyber Round-up

Cyber Round-up for 27th March

March 26, 2020

Cyber Round-up for 27th March

Welcome to the latest edition of the Ironshare CyberRound-up where we look back at the events of that last week and cover some ofthe news, posts, views, and highlights from the world of Security.

In this week’s round-up:

Security News

Volunteers Fighting Against COVID-19 Cyber Crime to Protect Healthcare

Cybercriminals have been exploiting the spread of COVID-19 and are actively targeting healthcare services with their attacks. Due to how overwhelmed the healthcare industry is, cybersecurity is not a priority at the moment, because of this hackers are finding easy ways into their systems, which not only has an effect on patient data, but can also cost lives due to compromised equipment and incorrect logs. The critical threat that is being created by these criminals has sparked an uprising of volunteer cyber-protectors who are determined to defend vulnerable healthcare organisations. Cyber Volunteers (CV19) has been established by some veteran cyber pro’s, Lisa Forte, Daniel Card and Radslaw Gnat to provide cyber support in this time of global crisis. With several thousand volunteers offering assistance, the group is doing admirable work and we suggest following their efforts on social media.

By Forbes.com

Coronavirus Scam Offers Free Netflix Subscription

A recent Netflix scam has been fooling its victims intobelieving they’re getting a free subscription due to the coronavirus isolation.It is unclear whether these scammers plan to download malicious code or stealcredentials, but a number of people have followed the bait and shared the siteon social media. If you come across this scam, be sure to not enter any detailsand definitely do not share it with your friends; much like the virus itself,you can prevent it from spreading by keeping it away from others.

By HotForSecurity.com

Threats

Tupperware Website Infected by Payment Card Skimmer Attack

US food container product company, Tupperware, has become avictim of payment card skimming; the malicious code was discovered by securityfirm, Malwarebytes, last week. Despite their warnings, Tupperware have notacknowledged the attack. The code reportedly works by impersonating the website’spayment form, collecting user data such as payment card credentials, usernames,emails and phone numbers. The fake payment form steals the data and shows atime-out error; however, by this time you’re already compromised. Attacks ononline stores are expected to rapidly increase due to most people beingconfined to their homes; this means more people than ever will rely on onlineshopping. We suggest avoiding any sites that are known to be affected whenshopping online to minimise the risk of an attack.

By ZDNet.com

Security Firm Exposes Over 5 Billion Records Left in Unsecured Database

A database of more than 5 billion customer records from thelast 8 years has been left publicly accessible without a password on theinternet. The exposed data includes hashed and plaintext passwords, emailaddresses and source of the leak; what makes this so much worse is that it wasleaked by a security firm. However, all data included in this breach arerecords from previous data breaches, so the victims were already at some risk;despite this, there is no excuse for a security company to put so many users atrisk and these kind of incidents should not be happening as frequently as theyare. Many admins ignore security features that are disabled by default, whichmeans systems are left completely unprotected; securing databases of this sizeis essential.  

By GrahamCluley.com

Vulnerabilities & Updates

Microsoft Announces New Critical Windows Exploit

Microsoft have recently warned the public of a new targeted attackcampaign affecting Windows 10 users. The attack involves the exploitation of acurrently unpatched critical vulnerability. This flaw exists in all supportedversions of Windows and allows an attacker to remotely execute arbitrary codeon the target system. Microsoft have issued a serious warning due to therebeing no fix for this exploit; it has been a tough few weeks for them, with anumber of serious vulnerabilities popping up, and they are doing their best to patchthe flaws as soon as possible. As of now, there are some preventative measuresyou can take to mitigate the risk; we suggest looking into these, which can befound in the security advisory.

By Forbes.com

Denial-of-Service Bugs in Intel Raid Web Console 3

Cisco Talos’ most recent vulnerability spotlight hashighlighted two denial-of-service flaws in Intel RAID Web Console 3. The flaw exitsin the application’s web API functionality and can be exploited by sendingmalicious POST requests to the API. Talos worked closely with Intel to patchthe bug as soon as possible, and an update is now available to those affected.We advise applying the necessary patch as soon as you get the chance, and ifyou want to read more about these vulnerabilities, details are included in Talos’vulnerability spotlight blog.

By TalosIntelligence.com

And that’s it for this week’s round-up, please don’t forget totune in for new instalments every week.

We hope this makes for light reading during these times ofuncertainty.

Stay Safe, Secure and Healthy!

Why not follow us on social media using the links providedon the right.

Edition #84 – 27th March 2020

Author

Stuart Hare is a Technologist with a passion for helping people in all aspects of IT & Cyber Security. Stuart is the Founder of Ironshare, an Information and Cyber Security company providing consultancy and managed services.

Samuel is a Security Analyst with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

Joshua is working as a Managed Service Lead with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

SUBSCRIBE

Ironshare is a provider of Information and Cyber Security services.

we went with; wizard pi