Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Sep 28, 2017By Shaina Raskin

A snapshot look at the cybersecurity breaches of last week.


Hackers posted 3.12 terabytes of VEVO’s internal files online. The files belong to music and video services from September 15th 2017. Some of the files contain sensitive data including alarm codes for the UK office. To read more:


The popular Windows utility CCleaner suffered a “security incident” that saw users updated with a legitimate digitally signed version of the software that opened a malicious backdoor. To read more: The company has since issued new code.

Pirate Bay

A cryptocurrency miner surfaced on the torrenting site for a day this weekend. Coin Hive lets companies monetize traffic by embedding a miner for Monero in the sites code. To read more:


Researchers found an open misconfigured AWS S3 bucket containing everything a hacker would need to take down the company’s IT systems. Some of the data was encrypted using GPG, but that would not be an issue for the hackers because the bucket also contained the decryption keys. To read more:


The SEC says its corporate filing system was hacked last year. To read more:


Security researchers found another data exposure at Verizon. Confidential documents were found on an unprotected S3 storage server. These detailed server and infrastructure maps, IP addresses, global router hosts among other things. To read more:

Reported Vulnerabilities

Red Alert 2.0

The banking Trojan has infiltrated a variety of third party apps. When a victim opens the app, the malware overlays a dialog, enticing users to enter their login details. When the credentials are stolen they are passed to a remote server. To read more:


The Chrome browser extension is secretly mining bitcoin. If you have the extension enabled it will run continuously in the background, running crypto mining code from Coin Hive. To read more:

Security Cameras

Proof-of-concept malware called aIR-Jumper can be used to defeated air-gapped network protections and send data in and out. To read more:

Want to learn more?

Sign up at below and receive weekly cybersecurity updates.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.