Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Aug 27, 2018By Shaina Raskin

A snapshot of last week’s reported breaches and vulnerabilities


Vulnerabilities have been discovered in multiple versions of Philips cardiovascular imaging devices. One vulnerability is a high-severity flaw that affects the Philips IntelliSpace Cardiovascular and Xcelera IntelliSpace Cardiovascular products. The flaw could allow attackers to escalate privileges and access folders containing executables. To read more:

Ransomware campaign

A new ransomware campaign is targeting large organizations around the world and appears to be connected to Lazarus. The ransomware is called Ryuk and first appeared in August. It is similar to the SamSam ransomware. To read more:

Facebook VPN

Apple required Facebook to remove its mobile VPN app called Onavo Protect from the iOS App Store. The app violated Apple’s App Store guidelines on data collection. To read more:


T-Mobile has reported a data breach that may have exposed the personal data for two million customers. To read more:

Cheddar’s Scratch Kitchen

Customers of Cheddar’s Scratch Kitchen restaurants are being warned that their credit card information may have been exposed in a data breach. While 567,000 customers are believed to be affected, the company is still investigating so the number impacted may rise. To read more:


Oversight by spyware developer SpyFone led to the leak of terabytes of data belonging to both customers and their targets. A researcher uncovered an Amazon S3 bucket belonging to the company which had been left online unprotected. To read more:


Iranian hackers are targeting universities in 14 countries in an attempt to steal intellectual property. The campaign was designed to steal credentials from academic staff using spoof websites. To read more:

Legacy Health

A data breach at Legacy Health may have compromised the information of 38,000 patients. The data breach was discovered in June but was not publicly announced until last week. To read more:


A babysitting-booking app called Sitter accidentally exposed the personal data of 93,000 account holders. A security researcher found the 2GB MongoDB database containing the personal information by using the Shodan IoT search engine. To read more:

Texas Voters

Voting records for 14.8 million Texas residents were left exposed online. Most of the information is public record but the files also include data that is considered confidential. To read more:


After a port was left open, more than 50.55 million user accounts of GOMO apps were accidentally exposed. The incident potentially compromised personal data which includes usernames, passwords, mobile numbers and unique device information. To read more:

Reported Vulnerabilities


Researchers at Trend Micro found that criminals are spamming ransomware to victims disguised as .EGG files. An .EGG is a compressed archive file format. Most of the world does not commonly use this format, however, it is very popular in South Korea where the attacks take place. To read more:

Canadian Telcos

Canadian telcos patched a local file-disclosure flaw in their disability services. The vulnerability exists in the seven-year-old SOLEO IP Relay platform that telcos can implement to allow hearing-impaired customers to initiate and conduct outbound voice via a web browser application. To read more:

Apache Struts

A security researcher has disclosed a critical remote code execution vulnerability in the Apache Struts framework that could allow remote attackers to run malicious code on affected servers. The vulnerability originates because of insufficient validation of user-provided untrusted inputs. To read more:


Project Zero’s security researchers discovered a critical remote code execution vulnerability in Ghostscript. Ghostscript is a software package that runs on a variety of platforms and converts PostScript language files to other raster formats. To read more:

Airmail 3

Attackers can steal an Airmail 3 user’s past emails and file attachments without requiring user interaction beyond opening a weaponized message. An attacker sends an email to an Airmail 3 user containing a link with a URL request that triggers the “send mail” function of the application. To read more:

Want to learn more?

Sign up below and receive weekly breach reports directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.