Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report – Dec. 9th

Dec 9, 2019By Shaina Raskin

A snapshot of last week’s reported cybersecurity breaches and vulnerabilities

Imminent Monitor RAT

Europol announced the shutdown of the criminal network behind Imminent Monitor RAT, a widely used hackers’ tool. IM-RAT was sold to more than 14,500 buyers and used against thousands of victims around the world. To read more:


Researchers found a database belonging to TrueDialog, a business SMS provider that exposed millions of SMS text messages. The service enables companies and universities to send bulk text messages to their customers and students. To read more:


A hacker is selling Mixcloud user data on a dark web marketplace. The hack was first announced last Friday and includes usernames, email addresses, hashed password strings, and other personal information. To read more:

Palo Alto Networks

Cybersecurity company Palo Alto Networks announced that it had suffered a data breach due to a third-party vendor error. To read more:


A new Windows trojan is trying to steal passwords from Google Chrome browsers. The malware uses a remote MongoDB database to store the stolen passwords. To read more:


Hackers found a way to reactivate canceled Netflix accounts without the victim knowing. Netflix stores customer data for ten months after someone cancels a subscription, which makes reactivation possible. To read more:

Strandhogg vulnerability

Researchers found a new unpatched vulnerability, known as Strandhogg, in Android. The vulnerability is in the multitasking feature that can be exploited by a malicious app installed on a device. To read more:


Microsoft fixed a vulnerability that enabled hackers to trick victims into handing over complete access to their online accounts. The bug enabled hackers to steal account tokens, which websites and apps use to grant users access without needing a password. To read more:

Tuft & Needle

Mattress company Tuft & Needle accidentally left an unprotected cloud server containing shipping information open on the internet. The unprotected AWS S3 bucket exposed more than 236,400 shipping labels. To read more:

Smith & Wesson

Gun maker Smith & Wesson’s online store was compromised by attackers who added code in an attempt to steal payment information. To read more:

Solara Medical

Solara Medical Supplies disclosed a data breach that impacted 114,000 patients. Patients filed a lawsuit against the company for failure to protect patients’ personal and medical information. To read more:


Researchers discovered two vulnerabilities in the GoAhead web server software found in IoT devices. One of the weaknesses is a code execution flaw that could enable an attacker to take control of a device. To read more:


If you have Avast and its subsidiary AVG installed on a Firefox or Chrome browser, you should disable it immediately. The browser extensions were collecting data, including browsing history on millions of users. To read more:

Python libraries

The Python security team removed two Python libraries from the Package Index that were stealing SSH and GPG keys. To read more:

New Zealand gun buyback

A data breach hit New Zealand’s gun-buyback scheme due to human error at SAP. Personal information and bank-account details were accessible during the breach. To read more:


A team of hackers gained access to an F-15 fighter in a US military test. It was the first time that researchers were allowed physical access to the jets to find weaknesses. To read more:


The bug bounty platform paid $20,000 to a hacker after it accidentally enabled users to read and modify customer bug reports. After learning about the incident, HackerOne was able to revoke the session cookie in two hours. To read more:


A new form of “wiper” malware is attacking companies in the Middle East. Researchers believe the malware is from Iranian state-sponsored groups. To read more:


This open-source operating system has four severe security vulnerabilities, one of which is an authentication bypass in the BSD Auth framework. The other three are privilege escalation bugs. To read more:

Chinese VC firm

Researchers found evidence that Chinese hackers stole $1m in seed money during a wire transfer between a Chinese venture capital firm and an Israeli startup. To read more:

Healthcare Administrative Partners

Medical billing provider Healthcare Administrative partners notified 17,693 patients of a data breach that may have exposed their health information. To read more:

Evil Corp

The US Justice and Treasury departments took action against a hacking group known as Evil Corp, which stole at least $100m from banks using malware. To read more:


Researchers discovered a new vulnerability in Linux that enables hackers to hijack VPN connections. The vulnerability impacts most Linux distributions as well as macOS, iOS, and Android. To read more:


Microsoft researchers scanned all Microsoft user accounts and found that 44m users used the same username and passwords that leaked online in other security breaches. To read more:

Great Cannon

The Chinese government deployed a DDoS tool known as the Great Cannon to launch attacks at an online forum where Hong Kong residents organized anti-Beijing protests. To read more:


Ransomware impacted CyrusOne, one of the largest data center providers in the US. Six of their managed-service customers experienced issues due to the ransomware encrypting devices on their networks. To read more:

Sprint contractor

A contractor of Sprint stored an unprotected cloud server with thousands of customer bills online. The bucket had more than 260,000 publicly available documents. To read more:

New Jersey Shakespeare Theater

A ransomware attack took down the ticket system and database for the New Jersey Shakespeare Theater, and impacted another organization in the area. The theater had to cancel its first show to create a new method of ticket sales. To read more:


The country of Ethiopia shut down the internet of the country for some 20 minutes to stop a cyberattack against multiple financial institutions. To read more:

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.