Last Updated on May 16, 2019

The second timeline of April is finally here (first one at this link), confirming the sustained level of activity that we have seen in the last months. In this fortnight I have collected 73 events.

Undoubtedly, ransomware, in its new targeted shape, is the attack vector that is characterizing this period. The list of the victim is quite long and includes Aebi Schmidt, A2 Hosting, Cleveland Hopkins International Airport, Verint, The Weather Channel, and many more.

New organizations have joined the list of the victims of mega breaches, such as Bodybuilding.com, potentially impacting several million users, and new e-commerce sites, including the online shops of the Atlanta Hawks, and Puma Australia, have joined the list of the Magecart victims.

Similarly the Cyber Espionage landscape is always crowded, one of the most well known actors, the infamous Iran-linked OilRig APT has been exposed, and this has allowed security researchers to understand that the group has been able to steal 13,000 passwords from 98,000 organizations worldwide.

Other unearthed operations include Sea Turtle (targeting organizations in the Middle East and North Africa), new campaigns against Ukraine, a comeback of the DNSpionage gang (with a possible link to OilRig), and much more…

Another long timeline, and another opportunity to spend some time to browse it, share it, and spread the verb of security awareness throughout the community (and do not forget to follow @paulsparrows on Twitter for the latest updates

wdt_IDIDDateAuthorTargetDescriptionAttackTarget ClassAttack ClassCountryLinkTags
1112/04/2019?FlashpointA 0-day vulnerability in the Yuzo WordPress plugin causes the Flashpoint website to briefly redirect the users to an external website with a pop-up leading to malware.O-day Wordpress VulnerabilityM Professional scientific and technical activitiesCCUSFlashpoint, Yuzo
2216/04/2019?iOS users from the U.S. and multiple European UnionResearchers from Confiant discover eGobbler, a massive malvertising campaign targeting iOS users from the U.S. and multiple European Union. Roughly 500 million users sessions were exposed.MalvertisingX IndividualCC>1Confiant, eGobbler, iOS
3316/04/2019?Multiple Ukrainian military departmentsResearchers from FireEye reveal that multiple Ukrainian military departments were targeted by a spear phishing campaign which attempted to drop a RATVERMIN backdoor as part of a second-stage payload delivered with the help of a Powershell script.Targeted AttackO Public administration and defence, compulsory social securityCEUAFireEye, RATVERMIN, Powershell
4416/04/2019?Single IndividualsResearchers from ESET reveal the details of Scranos, a rootkit-enabled operation spyware operation.MalwareX IndividualCC>1Scranos, ESET
5516/04/2019?Remotely Accessible Samba ServersA new ransomware family called NamPoHyu Virus or MegaLocker Virus is targeting victims, running locally on a victim's computer, and remotely encrypt accessible Samba servers.MalwareY Multiple IndustriesCC>1NamPoHyu, MegaLocker, Samba, Ransomware
6616/04/2019?Users of the popular Electrum Bitcoin walletResearchers from Malwarebytes reveal that since at least late December 2018, users of the popular Electrum Bitcoin wallet have fallen victim to phishing attacks, estimated to net crooks over 771 Bitcoins, approximately $4 million at current exchange rate.Account HijackingV FintechCC>1Bitcoin, Electrum, Malwarebytes, Crypto
7716/04/2019?Single IndividualsResearchers from ZeroFOX discover multiple campaigns exploiting the tragic fire of Notre Dame for fake donation pages and new phishing campaigns.Account HijackingX IndividualCC>1ZeroFOX, Notre Dame
8816/04/2019?Centrelake Medical GroupCentrelake Medical Group notifies almost 198,000 patients after a virus investigation reveals earlier intrusion and suspicious activity.MalwareQ Human health and social work activitiesCCUSCentrelake Medical Group
9917/04/2019?Organizations in the Middle East and North Africa (ministries, military organizations, intelligence agencies, energy companies).Researchers from Cisco Talos reveal the details of Sea Turtle, a state-sponsored attack manipulating DNS systems, targeting primarily national security organizations in the Middle East and North Africa.DNS HijackingO Public administration and defence, compulsory social securityCE>1Cisco Talos, Sea Turtle
101017/04/2019?VerintThe Israel offices of US cyber-security firm Verint are hit by ransomware.MalwareM Professional scientific and technical activitiesCCILVerint, Ransomware
IDDateAuthorTargetDescriptionAttackTarget ClassAttack ClassCountryLinkTags

This Post Has One Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.