News

Cybersecurity Weekly: Cloud service phish, Zoom URL flaw, Tetrade banking malware

Sam Fay
July 21, 2020 by
Sam Fay

A new phishing campaign abuses a trio of enterprise cloud services. A flaw in Zoom’s Vanity URL feature could have been exploited in phishing attacks. Tetrade banking malware families target users worldwide. All this, and more, in this week’s edition of Cybersecurity Weekly.

 

Top Security Awareness Posters

Top Security Awareness Posters

Download our collection of free posters and use them to keep security at the forefront of your employees' minds.

1. New phishing campaign abuses a trio of enterprise cloud services

A new phishing campaign uses Microsoft Azure, Microsoft Dynamics and IBM Cloud as part of an attempt to steal login credentials. The phishing email imitates a quarantined mail notification frequently sent out in workplaces by email security products and spam filters, asking the recipient to release messages stuck in the queue.
Read more »

 

2. A flaw in Zoom’s Vanity URL feature could have been exploited in phishing attacks

A vulnerability affecting the Zoom feature dubbed Vanity URL could have been exploited by hackers for phishing attacks. In the attack reported by researchers, the URL would actually point to a subdomain registered by the attacker with a name that looks like the one of the target. With this attack scheme, the attacker aims at tricking the victims into handing over credentials.
Read more »

 

3. Tetrade banking malware families target users worldwide

Cybersecurity researchers have detailed four different families of Brazilian banking trojans, tracked as Tetrade, that have targeted financial institutions in Brazil, Latin America and Europe.The four malware families are the result of a Brazilian banking group that is evolving its capabilities targeting banking users abroad.
Read more »

 

4. Several high-profile accounts hacked in Twitter hack

A number of high-profile Twitter accounts, including those of U.S. presidential candidate Joe Biden, Amazon CEO Jeff Bezos, Bill Gates, Elon Musk, Uber and Apple, were breached simultaneously in what's a far-reaching hacking campaign carried out to promote a cryptocurrency scam.
Read more »

 

5. BadPower attack corrupts fast chargers to melt or set devices on fire

Security researchers said they can alter the firmware of fast chargers to cause damage to connected charging systems, such as melt components or set devices on fire. According to researchers, the attack, dubbed BadPower, corrupts the firmware of newly-developed fast chargers.
Read more »

 

6. Hackers accidentally expose training videos online

An OPSEC error by an Iranian threat actor exposed the inner workings of the hacking group by providing a rare insight into the behind-the-scenes look into their methods. Some of the victims in the videos included personal accounts of U.S. and Greek Navy personnel, in addition to unsuccessful phishing attempts directed against U.S. state department officials.
Read more »

 

7. New Android malware steals passwords for non-banking apps too

Last week, cybersecurity researchers uncovered a new strain of banking malware that targets not only banking apps but also steals data and credentials from social networking, dating and cryptocurrency apps — a total of 337 non-financial Android applications on its target list.
Read more »

 

8. Orange confirms ransomware attack exposing business customers' data

The French telecommunications company confirmed that they suffered a ransomware attack exposing the data of twenty of their enterprise customers. On July 15th, 2020, the ransomware operators behind the Nefilim Ransomware added Orange to their data leak site and stated that they breached the company through their Orange Business Solutions division.
Read more »

 

9. Hackers look to steal COVID-19 vaccine research

The advanced threat actor known as APT29 has been hard at work attempting to steal COVID-19 vaccine research from academic and pharmaceutical research institutions in various countries around the world. The U.S. DHS advisory details the recent activity of APT29, including the use of custom malware called WellMess and WellMail for data exfiltration.
Read more »

 

Phishing simulations & training

Phishing simulations & training

Build the knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources. Unlock the right subscription plan for you.

10. Introducing the PhishingKitTracker

Experts that want to study phishing attack schema and Kit-composition can use the new PhishingKitTracker, which is updated automatically. Created by security researcher Marco Ramilli, this tracker correlates phishy domains and follows the attack chain back to a single phishing attack.
Read more »

Sam Fay
Sam Fay