Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Apr 1, 2019By Shaina Raskin

A snapshot of last week’s reported cybersecurity breaches and vulnerabilities

ASUS software updates
Researchers at Kaspersky Lab found that update software from ASUS, a large Taiwanese computer maker, was hijacked and used to install a malicious backdoor?—?known as ShadowHammer?—?on numerous customers’ computers. The malicious file was signed with legitimate ASUS digital certificates to make it seem harmless. Half a million Windows machines received the backdoor via an update server. To read more:

ASUS released a new version of its Live Update software to address the ShadowHammer attack. The company is also working on new security mechanisms to secure its systems in future. To read more:

DragonEx and CoinBene
Two cryptocurrency-exchange portals disclosed hacks and have “gone into maintenance mode” to investigate the issues. DragonEx estimated that it lost more than $1m of cryptocurrency, while CoinBene’s losses are greater than $45m. To read more:

Office Depot and
America’s Federal Trade Commission ordered Office Depot and to pay $35m after they were accused of duping customers into paying “cleanup fees” to rid their PCs of non-existent malware. To read more:

Hackers stole more than 26,400 gallons of fuel from Total gas stations around Paris by unlocking pumps with a remote device. The hack was possible because some gas stations had not changed the pump’s lock code from its default of “0000”. To read more:

Voting machines
Senators are asking the largest U.S. voting-machine makers to explain why they sell devices with known vulnerabilities. A letter was sent to ES&S, Dominion Voting and Hart InterCivic asking that they explain why they sell decades-old machines that could be easily exploited. To read more:

Toyota announced the second of two data breaches in the past five weeks. The first took place at an Australian subsidiary, the second at its Tokyo headquarters. Hackers accessed servers with stored sales information on 3.1m customers. To read more:

Zammis Clark aka Slipstream
A security researcher named Zammis Clark?—?but also known as Slipstream?—?admitted to hacking into Microsoft and Nintendo servers and stealing confidential information. Using an internal username and password, he uploaded a web shell to remotely access Microsoft’s network freely for at least three weeks. In total, 43,000 files were stolen. To read more:
More than 980m users’ personal information was exposed in a data breach of last month. The leaked data included names, birthdays, social-media accounts and places of employment. is used to check whether marketing emails sent to group emails will bounce back. To read more:

Earl Enterprises
This parent company of Buca di Beppo, a chain of Italian restaurants, announced that it had remediated a ten-month data breach of its payment systems at numerous restaurants. KrebsOnsecurity contacted Buca di Beppo after finding two million freshly stolen credit and debit cards on the dark web. To read more:

Two security researchers confronted executives from Atrient, a casino-technology firm, at a conference about a bug bounty, but the ensuing conversation quickly went off the rails… To read more:

Check out Have I Been Pwnedto see if any of your accounts have been exposed by the above breaches.

Reported Vulnerabilities

Tesla in-car browser
Security researchers took home a Tesla Model 3 as a reward for successfully exposing a vulnerability in the car’s infotainment system. The pair used a JIT bug to bypass memory-randomization data that keeps information protected. To read more:

Pegasus malware
Researchers found evidence that Pegasus malware was deployed against victims in 45 countries?—?a number greater than that of known operators, suggesting that some are conducting illegal cross-border surveillance. The malware was created by cybersecurity firm NSO Group. To read more:

UC Browser
China-made UC Browser contains a feature that could be exploited by remote attackers to automatically download and execute code on Android devices. UC Browser is one of the world’s most popular mobile browsers, with 500 million users. To read more:

Programming languages
A report from WhiteSource found that the top three most insecure programming languages are C, PHP and Java. WhiteSource aggregates information on open-source vulnerabilities from the National Vulnerability Database, GitHub issue trackers, and more. The language C has the highest number of vulnerabilities, accounting for nearly 50% of breaches over the past ten years. To read more:

Apple patched 51 security vulnerabilities in its mobile operating system. Most of the weaknesses were found in its web-rendering engine WebKit. To read more:

Microsoft researchers found a severe privilege-escalation flaw in the Huawei PCManager driver software for Windows 10 laptops. Third-party kernel drivers are more attractive to attackers than expensive zero-day kernel exploits. To read more:

Magento released a new version of its software to fix 37 new security vulnerabilities. Magento is used across 28% of websites on the Internet. One of the flaws is a SQL injection vulnerability, which can be exploited remotely. To read more:

LTE protocol
A group of researchers identified 36 new vulnerabilities in the Long Term Evolution (LTE) standard used by mobile networks. The vulnerabilities enable attackers to disrupt mobile base stations, block incoming calls, disconnect users from a network, and more. To read more:

Want to learn more?

Sign up below and receive these reports and more, directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.