Cyber Round-up

Cyber Round-up for 8th November

November 7, 2019

Cyber Round-up

Cyber Round-up for 8th November

Welcome to the Ironshare Cyber Round-up where we look back atthe events of that last week and cover some of the news, posts, views, and highlightsfrom the world of Security.

In this week’s round-up:

Security News

Equifax - On the inside of a hacking catastrophe

InSeptember 2017, Equifax suffered a massive data breach affecting 147 millionpeople in the US and 14 million in the UK. The breach included the birth dates,social security numbers and payment card details of all affected users. Thisarticle covers a different, often-missed aspect of a breach; the overwhelming humanimpact on the staff. Loss of the leadership team, long hours, huge pressure,demand and criticism of the IT & Security teams, being forced to maintainsecrecy, and online abuse, all lead to a decline in the mental health of thoseinvolved. The Equifax breach should be a lesson to all Companies; focus on all thepotential impact areas, including human factors and not just the financial consequences.

Over thelast two years, Equifax have responded to the incident by spending $1.25billion on the transformation of their security capabilities. Equifax are now consideredone of the industry leaders in security after the changes made following thebreach.

By BBC.co.uk

Trend Micro Insider Threat Affecting Consumer Customers

A recentsecurity incident has led to customer’s personal information being leaked tothe public. Following the leak, Trend Micro, a global security firm, immediatelystarted to investigate; during the investigation their lead suspect was one oftheir own employees who had stolen the data with malicious intent. Theyconfirmed in a recent report that there was no external hack involved and theleak was in fact a result of an insider threat. Insider threats are often overlookedbut should be seen a major threat to any organisation. The company have sincerely apologized to allwho received scam calls from the criminal and responded to the incident veryquickly.

By TrendMicro.com

Threats

Office 365 Phishing Campaign Targets Users Disguised as Pay Rise

Scammers have found a new way to bait their victims into falling for phishing attempts; in a recent campaign, scammers have disguised themselves as the victim’s Human Resources department and tempted them with a pay rise. The email prompts them to open an excel spreadsheet which redirects them to a fake Office 365 login page. These kinds of branded phishing attacks have been very successful against a large number of employees; unless you know what you are looking for, the login page can be very deceiving and often perceived as legitimate. Always be cautious when dealing with emails such as this, and only click on links if you are certain they are from a trusted source. If it sounds too good to be true, your probably right.

By BleepingComputer.com

MageCart Group Launches Card Skimming Attack on Sites Simultaneously

Researchers have recently identified a spate of MageCart attacks carried out by multiple groups on the same sites at the same time. This is believed to be the result of a cybercrime-as-a-service operation, in which various groups breach websites using card skimming kits purchased on the internet. After an attack is disclosed, it is likely that multiple groups will attempt to take advantage of it. This was seen on the online store PEXSuperstore; the site was infected with two MageCart skimmers that were completely different. The main similarity that researchers have picked up on is that both attacks targeted Magento-based websites and injected code in similar ways; it is believed that these simultaneous attacks are not intentional, with several groups running multiple campaigns without realizing.

By ThreatPost.com

Vulnerabilities & Updates

Zero-Day Vulnerability Discovered in Google Chrome Browser (CVE-2019-13720)

A new zero-day vulnerability has been found that affects the Google Chrome web browser. The exploit was found by Kaspersky, a Russian cyber security firm, who believe it is being used in a campaign known as ‘Operation WizardOpium’; this campaign is possibly linked to the Lazarus group of attacks. The bug has been flagged as very dangerous, as it allows attackers to execute code when exploited. Google have now released a patch for this vulnerability; we recommend applying this patch as soon as possible. More details on the nature of the bug included in the original post.

By GulfNews.com

And that’s it for this week round-up, please don’t forget totune in for our next instalment.

Why not follow us on social media using the links providedon the right.

Edition #66 – 8th November 2019

Author

Stuart Hare is a Technologist with a passion for helping people in all aspects of IT & Cyber Security. Stuart is the Founder of Ironshare, an Information and Cyber Security company providing consultancy and managed services.

Samuel is a Security Analyst with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

Joshua is working as a Managed Service Lead with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

SUBSCRIBE

Ironshare is a provider of Information and Cyber Security services.

we went with; wizard pi