Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report – Dec. 2nd

Dec 2, 2019By Shaina Raskin

A snapshot of last week’s reported cybersecurity breaches and vulnerabilities

VNC software

An analysis of four open-source virtual network computing (VNC) desktop applications revealed a total of 37 vulnerabilities, most of which had gone undetected for the past 20 years. The analysis focused on widely used VNC software, specifically LibVNC, UltraVNC, TightVNC and TurboVNC. To read more:


Chinese smartphone maker OnePlus experienced a data breach that exposed personal and order information for an undisclosed number of customers. To read more:


NextCry, a new ransomware strain, encrypts data on NextCloud Linux servers and evades most antivirus engines. No free decryption tools currently exist. To read more:

Chrome, Safari, Edge

While attending a security event, Chinese white-hat hackers were able to exploit vulnerabilities in major browsers and other commonly used software. To read more:


Researchers discovered a hacking operation aimed at Kazakhstan. Targets include government agencies, military personnel, diplomats, researchers and journalists. To read more:

Obstruction lighting

A researcher discovered 46 control panels for obstruction lighting that were open on the internet. Hackers could have turned off the lights, which are placed on tall structures in order to warn airplanes not to hit them. The FAA is working to fix the issue. To read more:

Online server

A dark-web researcher found a server with 1.2bn records exposed on the internet. The data contains personal information associated with profiles on social media such as Facebook, Twitter, LinkedIn and Github, including almost 622m unique email addresses. To read more:

Allied Universal

After not receiving a ransom payment from Allied Universal, the group behind Maze Ransomware published 700 MB of data and files that it had stolen from the security-staffing company. This makes up only 10% of the stolen files, and the attackers threaten to release the rest if payment is not made. To read more:

Virtual Care Provider

Hackers are holding data hostage from Milwaukee-based Virtual Care Provider, a company providing internet security and data storage to more than 100 nursing homes across the US. The company is working to restore data and handle any life-threatening situations caused by the hack. To read more:

NYPD fingerprint database

The fingerprint database of the New York Police Department (NYPD) was shut down after a contractor at its Queens training facility plugged in a mini-PC that was infected with a virus. The virus spread to 23 NYPD machines. To read more:


The governor of Louisiana declared a state of emergency after ransomware knocked key state services offline. Most affected was the Office of Motor Vehicles, which had still not recovered a week later. Although only 132 of 5,000 servers were compromised, the state is struggling to return services to normal. To read more:

California DMV

The California Department of Motor Vehicles is generating $50m a year by selling drivers’ personal information to commercial entities. To read more:

Android SDKs

Two software-development kits that are integrated into thousands of Android apps were found to be accessing user data connected to social media accounts. To read more:

Credit and debit cards

One of the largest dark-web bazaars is selling 4m credit and debit cards stolen in security breaches at four restaurant chains. The breaches occurred in August 2019 at Krystal, Moe’s, McAlister’s Deli and Schlotzsky’s. To read more:


Fortinet, a cybersecurity vendor, was shipping hard-coded encryption keys on its hardware for 18 months. The keys were found inside FortiOS for FortiGate firewalls and FortiClient endpoint-protection software. To read more:


A new hacking campaign was discovered looking for Docker platforms with exposed API endpoints. Hackers scanned 59,000 IP networks to find the platforms, which were then compromised with cryptomining malware. To read more:


Google informed more than 12,000 users that they were targeted by government-backed hacking in Q3 this year. More than 90% of the users were hit with phishing attempts to trick them into handing over Google account credentials. To read more:

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.