Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Jan 14, 2019By Shaina Raskin

A snapshot of last week’s reported cybersecurity breaches and vulnerabilities

NSA tools
The NSA is planning to release its GHIDRA reverse-engineering tool for free. GHIDRA is a Java-based framework that runs on various platforms, including Windows, MacOS and Linux. To read more:

Early Warning Network: Australia
Hackers were able to send spam messages to subscribers of Australia’s Early Warning Network, a large-scale emergency-warning system. The hackers used stolen credentials to log into the system and send the messages. To read more:

An exploit vendor known as Zerodium is offering to pay $2m for remote iOS jailbreaks and $1m for exploits targeting secure-messaging apps. The highest previous payout was $1.5m for an iOS jailbreak that could be executed remotely. To read more:

Town of Salem
A few weeks ago a popular browser game called Town of Salem had a data breach that exposed 7.6 million hashed passwords. Since then over 27% of the passwords have been cracked. BlankMediaGames, which created the game, found and removed three different PHP files from its web server that enabled the hackers to have a backdoor and exploit the system. To read more:

Ethereum Classic
Coinbase has suspended all Ethereum Classic transactions on its trading platform after detecting an attack that enabled a hacker to spend the same digital coins twice. This attack lost $1.1 million worth of Ethereum Classic currency. To read more:

Centerstone Insurance and Financial Services, which does business as BenefitMall, announced that it had experienced a data breach that may have impacted some of its customers. The company said that an email phishing attack exposed employee login credentials. To read more:

Humana, an American health-insurance company, recently notified members that their information may have been (read: probably was) accessed in a cyberattack that occurred in May 2018?—?at least seven months ago. To read more:
Hackers broke into’s website using malicious code to steal customers’ credit cards and other personal information. The breach occurred from August 5th to November 16th, 2018?—?again, months ago. To read more:

Chinese resumes
Researchers found a database online containing records of more than 202 million Chinese citizens that was accessible to anyone without authentication. An unnamed American company was hosting the database in a MongoDB instance. The database is apparently now secured. To read more:

OXO International
OXO International disclosed a data breach that may have exposed customer information over two years. The company is a manufacturer of homeware, office supplies and kitchen utensils. To read more:

PyLocky Ransomware
A security researcher from Cisco’s Talos cyber-unit released a free decryption tool that makes it possible for infected victims to unlock their files without paying a ransom. The limitation is that to recover the data successfully, the victim must have captured the initial network traffic between the ransomware and its command-and-control server. To read more:

This US food distributor, which was hit by the NotPetya ransomware, is suing its insurance company for refusing to pay out on a claim for damages caused by the hack. To read more:

Sellers on Amazon India encountered a bug in the website where they could access the Merchant Tax Reports of other sellers besides their own. Amazon has since fixed the issue and claims that only 400,000 sellers were hit by the breach. To read more:

Reported Vulnerabilities

A bug in Skype could have enabled hackers to bypass authentication and access personal data on an Android device by answering a Skype call to that device. To read more:

Google removed 85 apps from the Play Store after discovering that they were pushing adware to users. The apps push full-screen ads at regular intervals onto user devices without consent. To read more:

Alcatel phones
A pre-installed weather app on Alcatel smartphones contained malware that subscribed device owners to premium phone numbers without their knowledge. To read more:

DNS hijacking
Researchers at FireEye have linked a wave of global DNS hijacking attacks to Iran. The attacks focused on government, telecom and internet-infrastructure companies. The hackers were trying to steal victims’ usernames, passwords and domain credentials. To read more:

Security researchers found three vulnerabilities in Systemd, a Linux software suite, that could enable attackers to gain root access to targeted systems. The vulnerabilities are in the service that collects information from different sources and creates event logs in the journal. The bugs impact all Linux distributions, including Red Hat and Debian. To read more:

A new penetration-testing tool can automate phishing attacks more easily than ever before. The tool is a reverse-proxy that was modified for handling traffic meant for login pages. To read more:

Fuze cards
Hackers who specialize in cashing-out stolen credit cards are making heavy use of Fuze cards?—?smartcard devices that enable users to store dozens of credit and debit cards on a single device. To read more:

Want to learn more?

Sign up below and receive these reports and more, directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.