Security Staff Acquisition & Development, Identity, Incident Response, Leadership, Security Staff Acquisition & Development, Threat Management
Job Expectations, Pi Password Thief, Python Masscan, & Pingback – PSW #693
This week in the Security Weekly News the crew talks: Pingback is back, was it ever really gone?, damn QNAP ransomeware, anti-anti-porn software, Qualcomm vulnerabilities, spreading pandas on Discord, the always popular Chinese APTs, exploits you should be concerned about, job expectations, westeal your crypto currency, quick and dirty python (without lists), new spectre attacks, Github says don't post evil malware and more!
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
Hosts

Doug White
Professor at Roger Williams University

Larry Pesce
Product Security Research and Analysis Director at Finite State
- 1. An estimated 30% of all smartphones vulnerable to new Qualcomm bug
- 2. They Told Their Therapists Everything. Hackers Leaked It All
- 3. Review
- 4. Shave 99.93% off your Lambda bill with this one weird trick
- 5. Your Car Is Spying on You, and a CBP Contract Shows the Riskswith over two dozen makes
- 6. Pingback: Backdoor At The End Of The ICMP Tunnel
- 7. Video: AirTag gets the teardown treatment, revealing how the speaker works and more – 9to5Mac
- 8. I’ve just been HIT by a global ransomware attack, QNAP need to be held accountable for this
- 9. Josh Duggar’s wife installed anti-porn software on his computer, but Duggar used anti-anti-porn software to download child porn, says fed agent

Lee Neely
Information Assurance APL at Lawrence Livermore National Laboratory
- 1. New Windows ‘Pingback’ malware uses ICMP for covert communicationResearchers say they have identified a novel Windows malware sample dubbed "Pingback" that leverages ICMP for C&C communications and DLL hijacking to achieve persistence on targeted Windows 64-bit systems.
- 2. U.S. Organizations Targeted by New Cybercrime Group With Sophisticated MalwareA new threat actor that appears to be financially motivated has targeted many organizations in the United States and other countries. The attacks involved three previously unseen pieces of malware tracked by FireEye as DOUBLEDRAG, DOUBLEDROP and DOUBLEBACK. DOUBLEDRAG is a downloader delivered in the first stage of the attack and which in some cases was replaced with a malicious Excel document that served as a downloader. DOUBLEDRAG is designed to connect to a C&C server and fetch DOUBLEDROP, a memory-only dropper that deploys DOUBLEBACK, a backdoor that is apparently still under development
- 3. ATT&CK v9 Introduces Containers, Google WorkspaceMITRE announced last week that the latest update to the popular ATT&CK framework introduces techniques related to containers and the Google Workspace platform. ATT&CK v9 includes another significant change that consolidates AWS, Azure, and Google Cloud Platforms into a single infrastructure-as-a-service (IaaS) platform.
- 4. Utah County’s Online Marriage System Takes Off During PandemicDigital marriage licenses. Zoom ceremonies. Everyday citizens becoming wedding officiants. Utah County, Utah's online marriage license system became a big hit after COVID-19 shut down most offices that issue marriage licenses.
- 5. Exclusive: Hackers Break Into Glovo, Europe’s $2 Billion Amazon RivalA cyber crime group breached its systems and began selling access to compromised customer and courier accounts on Amazon rival Spanish delivery service Glovo, just one month after announcing it had taken in $1 billion in funding and has plans to go public in a few years.
- 6. Pulse Secure Patches Critical Zero-Day FlawPulse Secure has released a patch addressing the critical authentication bypass vulnerability (CVE-2021-22893). Run the Pulse Secure Integrity Checker prior to patching.
- 7. U.S. government probes VPN hack within federal agencies, races to find cluesThe U.S. government says it is investigating a recently discovered supply chain attack in which attackers leveraged vulnerabilities affecting the Pulse Secure VPN to target more than a dozen federal agencies.
- 8. ‘Tens of thousands’ of SIM cards hackedHackers are now claiming they have accessed "tens of thousands" of SIM cards following a cyber attack against telecommunications firm Schepisi Communications, which is self-described as a "platinum partner" of Melbourne-based Telstra that provides cloud storage and telephone numbers on behalf of Telstra.
- 9. First Horizon Bank Customers Have Account Funds DrainedUsing obtained credentials and exploiting a vulnerability in third-party security software, the unauthorized party gained unauthorized access to under 200 online customer bank accounts, had access to personal information in those accounts, and fraudulently obtained an aggregate of less than $1 million from some of those accounts.
- 10. PoC exploit released for Microsoft Exchange bug dicovered by NSATechnical documentation and proof-of-concept exploit (PoC) code is available for a high-severity vulnerability in Microsoft Exchange Server that could let attackers execute code on unpatched systems. Attackers can exploit CVE-2021-28482 if the are authenticated on an on-premises Exchange server instance not patched with Microsoft's April update. A python based PoC exploit has been released.
- 11. Contact Tracer Breach Hits the Keystone StatePennsylvania DOH is accusing contact tracing company Insight Global, which was contracted to provide the state with "contact tracing and other services," of willfully disregarding security protocols and exposing PHI and PII belonging to some 72,000 people.
- 12. Stealthy RotaJakiro Backdoor Targeting Linux SystemsChelle brought this to my attention. Previously undocumented piece of Linux malware dubbed "RotaJakiro" that functions as a backdoor and has gone undetected for at least three years have been spotted being used in attacks targeting Linux X64 systems.
- 13. New micro-op cache attacks break all Spectre defencesResearchers at the universities of Virginia and California in the United States have devised new Spectre-style hardware attacks that make it possible to steal data when processes retrieve commands from their micro-ops caches.
- 14. TurgenSec finds 345,000 files from Filipino solicitor-general’s office were breachedAccording to TurgenSec, the compromised documents include documents generated during daily operations, staff training, internal passwords and policies, staff payment information, information related to financial processes, and other activities such as audits.
- 15. Chinese APT Actors Attack Russian Defense In An Espionage AttackTthe "PortDoor" backdoor developed by Anonymous is likely being leveraged by Chinese APT actors in phishing attacks targeting Russian firm Rubin Design Bureau, which builds submarines for the Russian Navy Federation. RoyalRoad is used by attackers to create weaponized RTF document designed to exploit three vulnerabilities (CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802) affecting Microsoft's Equation Editor.
- 16. CVE-2021-21551- Hundreds Of Millions Of Dell Computers At Risk Due to Multiple BIOS Driver Privilege Escalation Flaws – SentinelLabsExecutive Summary SentinelLabs has discovered five high severity flaws in Dell’s firmware update driver impacting Dell desktops, laptops, notebooks and tablets. See also: https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability