Tends
Cyveillance Weekly Phishing Report – February 17, 2016
https://blog.cyveillance.com/cyveillance-weekly-phishing-report-february-17-2016/
5 Exploit Trends Driving Attacks Today
http://www.darkreading.com/perimeter/5-exploit-trends-driving-attacks- today/d/d-id/1324352
Malware
Dridex diversifies into Ransomware
http://www.itwire.com/business-it-news/security/71505-dridex-diversifies-into- ransomware.html
&
Dridex financial Trojan generates millions of spam emails daily http://www.itwire.com/business-it-news/security/71503-dridex-financial-trojan- generates-millions-of-spam-emails-daily.html
&
Locky Ransomware Borrows Tricks from Dridex https://threatpost.com/locky-ransomware-borrows-tricks-from-dridex/116304/
WordPress Compromise Campaign: From Nuclear EK To Angler EK
https://blog.malwarebytes.org/exploits-2/2016/02/wordpress-compromise- campaign-from-nuclear-ek-to-angler-ek/
Tech Support Scammers Use Subdomain Trick To Defeat Blocking (Updated)
https://blog.malwarebytes.org/fraud-scam/2016/02/tech-support-scammers- use-new-browser-trick-to-defeat-blocking/
Attackers
Poseidon cybergang infects victims, then blackmails them
http://www.scmagazine.com/cybergang-using-spearphishing-and-blackmail-to- exploit-firms/article/475423/
Vulberabilities
Aas for actual WordPress pingbacks …. you should probably switch ’em of
http://www.theregister.co.uk/2016/02/18/ddos_dingbats_enslave_tens_of_thousands_ in_wordpress_pingbacks/
519070 or blank: The PINs that can pwn 80k online security cams
http://www.theregister.co.uk/2016/02/18/blank_519070_the_pin_to_enter_to_pw n_80k_online_security_cams/
General
How hackers make millions of YOUR credit card: Researchers reveal cyber criminals can make $8m from just 50 cards
Read more: http://www.dailymail.co.uk/sciencetech/article-3451408/How-hackers- make-millions-credit-card-Researchers-reveal-cyber-criminals-make-8m-just-50- cards.html#ixzz40Wd8GWj4
Researchers leak phony data on dark web to track journey
http://www.scmagazine.com/bitglass-experiment-puts-phony-data-on-dark-web- to-see-where-it-goes/article/475279/
HONEYPOTS ILLUSTRATE SCORES OF VULNERABILITIES IN MEDICAL DEVICES
http://threatpost.com/honeypots-illustrate-scores-of-vulnerabilities-in-medical- devices/116280/
Free Text
Cyber risks evolving to hit less traditional targets http://www.businessinsurance.com/article/20160217/NEWS06/160219836?tags=58| 418|417|411|83|76
Last year was the year of collateral damage with respect to cyber risks with
attacks touching people “who never dreamed they might be involved in a security breach,” says Hewlett-Packard Co. in a report issued Wednesday.
The Palo Alto, California-based information technology firm says in its “Cyber Risk Report 2016” that the United States Office of Personnel Management and extramarital affairs website Ashley Madison were among those hit by cyber breaches in 2015.
“Data compromise is no longer just about getting payment card information. It’s about getting the information capable of changing someone’s life forever,” says the report.
Other key themes last year were:
• “Overreachingregulationspushresearchunderground.”Toooften,saysthe
report, legislation “incurs unwanted consequences to go along with the intended result.”
• “Movingfrompointfixestobroadimpactsolutions,”which“strainsthe resources of both the vendor developing the patch and the customer deploying
the patch.”
• “Politicalpressuresattempttodecoupleprivacyandsecurityefforts.”Many
lawmakers in the U.S., the United Kingdom and elsewhere “claimed that security was only possible if fundamental rights of privacy and due process was abridged,” says the report.
• Theindustry’sfailuretolearnanythingaboutpatchingin2015.“While vendors continue to produce security remediation, it does little good if they
are not installed by the end user,” the report says.
• Attackershaveshiftedtheireffortstodirectlytargetapplications.“They
see this as the easiest route to accessing sensitive enterprise data and are doing everything they can to exploit it,” says the report.
• The“monetization”ofmalicioussoftware,which“hasledtoanincreasein ATM-related malware, banking Trojans and malware,” says the report.