- 1. Discord is now an essential tool for hackers
Gaming-centric messaging platform Discord has become a favorite tool among cybercriminals, research suggests. A new report from security company Sophos says it uncovered 17,000 unique malware URLs in Discord's content delivery network (CDN), nearly 5,000 of which are still active.
- 2. Security vulnerabilities in IDEMIA access control devices could allow attackers to ‘remotely open doors’
Three vulnerabilities (CVE-2021-35522, CVE-2021-35520, CVSS 6.2, and CVE-2021-35521) affecting biometric access control devices manufactured by IDEMIA that could be exploited by attackers to remotely execute arbitrary code, cause a DoS condition, or read/write arbitrary files on compromised devices. According to researchers from Positive Technologies.
- 3. Microsoft Warns of LemonDuck Malware Targeting Windows and Linux Systems
PowerShell based crypto-mining malware has continued to refine and improve upon its techniques to strike both Windows and Linux operating systems by exploiting older vulnerabilities while concurrently using various spreading mechanisms to maximize their campaigns' efficacy.
- 4. Threat actor offers Clubhouse secret database containing 3.8B phone numbers
A threat actor has reportedly posted and offered up for sale a "secret" database belonging to social audio app "Clubhouse" containing some 3.8 billion phone numbers belonging to Clubhouse users, including more than 83 billion numbers belonging to Japanese users. Information compromised in the breach is said to include victims' user IDs, full names, usernames, Twitter handles, Instagram handles, number of followers, number of people followed by the users, accounts' creation dates, and invited by user profile names, but no financial data.
- 5. China’s New Law Requires Vendors to Report Zero-Day Bugs to Government
The Cyberspace Administration of China (CAC) has issued new stricter vulnerability disclosure regulations that mandate software and networking vendors affected with critical flaws to mandatorily disclose them first-hand to the government authorities within two days of filing a report.
- 6. TikTok, Snapchat account hijacker arrested for role in Twitter hack
DOJ has announced the arrest of 22-year-old U.K. national Joseph O’Connor for his role in the 2020 Twitter hack. The criminal complaint alleges that O'Connor was also involved in taking over Snapchat and TikTok accounts.
- 7. Chinese spies are exploiting routers to try hacking French targets, cyber agency says – CyberScoop
ANSSI, French National Agency for the Security of Information Systems has revealed it is now dealing with a "massive" hacking campaign being conducted by the China-linked advanced persistent threat (APT) group APT31.
- 8. Average time to fix high severity vulnerabilities grows from 197 days to 246 days in 6 months: report
A research group’s analysis determined that the time required for a vendor to learn of, and then release a security update to close a vulnerability has risen from an average of 197 days to 246 days. Further, the group found that within the Utilities sector that more than 65% of their software applications contained at least one serious exploit – the worst statistic across all measured categories.
- 9. Ninth Circuit limits feds’ confiscation of cellphones, laptops at points of entry: report
San Francisco’s 9th Circuit recently ruled that Border Patrol agents positioned at some U.S. checkpoints located across states that they officiate over will, by and large, require a search warrant to access a traveler’s laptop computer or cell phone without the travelers consent. Agents may only search the electronic devices for digital contraband (e.g. child pornography).
- 10. BlackMatter Ransomware Claims to Be Best of REvil, DarkSide
Possible former DarkSide affiliate now associated with DarkMatter. While REvil sites were takend down in July, it's not clear that Sodinokibi operations have ceased.