LATEST: Threat Intelligence Update - December 2020 - Part D
Latest security news, threats, vulnerabilities, tools, alerts, and recommended reading(s)
Advisories
- SolarWinds Security Advisory
- Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks
- DHS - Mitigate SolarWinds Orion Code Compromise
Vulnerabilities & Patches
- Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
- Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
- Cisco Jabber Desktop and Mobile Client Software Vulnerabilities
- Security update available for Adobe Acrobat and Reader | APSB20-75
Cyber Crime & Incidents
- Microsoft says it found malicious software in its systems
- Operation SignSight: Supply?chain attack against a certification authority in Southeast Asia
- Third Party Browser Extensions for Instagram, Facebook, Vimeo and Others Infected with Malware
- Subway marketing system hacked to send TrickBot malware emails
- IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms
- Lithuania Suffers "Most Complex" Cyber-attack in Years
- Medical scans of millions of patients exposed online
- Defence tech service provider firm's data hacked, company claims Rs 50-cr loss
Threats
- CISA - Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations
- Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
- Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers
- Dark Halo Leverages SolarWinds Compromise to Breach Organizations
- cPanel and WHM Vulnerability Easy to Exploit With Dark Web Credentials
- Unpatched, Unprepared, Unprotected: How Critical Device Vulnerabilities Remain Unaddressed
Tools
- Using Speakeasy Emulation Framework Programmatically to Unpack Malware
- SUNBURST DGA decoder
- SoReL-20M - Sophos-ReversingLabs 20 Million dataset
Reports
Research
- SunBurst: the next level of stealth
- PyMICROPSIA: New Information-Stealing Trojan from AridViper
- Everything but the kitchen sink: more attacks from the Gitpaste-12 worm
- Pay2Key Ransomware – A New Campaign by FoxKitten
Events Materials
Guidelines
- 5G Supplement - to the Guideline on Security Measures under the EECC
- Guidelines - Cyber Risk Management for Ports
Webcasts / Podcasts
- Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcast
- Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast
- When your forensic tool only tells part of the story finding code injection using memory analysis
How to
- NSA - Detecting Abuse of Authentication Mechanisms
- SolarWinds Post-Compromise Hunting with Azure Sentinel
- How to investigate like an Expel analyst: The Expel Workbench managed alert process
- Infrastructure Research and Hunting: Boiling the Domain Ocean
Privacy and Compliance
- FTC Issues Orders to Nine Social Media and Video Streaming Services Seeking Data About How They Collect, Use, and Present Information
- Could Universities' Use of Surveillance Software Be Putting Students at Risk?
- China: Big Data Program Targets Xinjiang’s Muslims
Official Information Source: StationX