Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Oct 30, 2017By Shaina Raskin

A snapshot look at the breaches and reported vulnerabilities of last week

Sofacy group

The Russian-speaking APT group has been targeting researchers, admins and others connected to cybersecurity. Cisco’s security researchers found a campaign linked to Sofacy that used a decoy document related to the CyCon US conference as a lure. To read more:

Critical infrastructure

Hackers are attempting to gain access to the networks of critical-infrastructure companies. The FBI and DHS warn of an ongoing campaign to infiltrate the networks of power companies and steal details of control systems. To read more:

London Bridge Plastic Surgery

A plastic-surgery clinic frequented by celebrities in the UK was targeted by hackers. The hackers threatened to publish the patient list and photos online. To read more:


Coinhive has admitted to a security breach where hackers were hijacking cryptocurrency mining scripts on various websites. The DNS records for were manipulated to redirect requests for coinhive.min.js to a third-party server. To read more:


Dell lost control of the website they set up to help customers recover from malicious software. Sometime this summer was hacked for a month and exposed to malware. To read more:


The NotPetya malware infection shut down the pharmaceutical company’s production of the pediatric HPV vaccine. The company was forced to borrow the drug from a stockpile maintained by the CDC. To read more:

Reported Vulnerabilities

Reaper IoT

Researchers are warning that a new botnet could dwarf Mirai in terms of its scale and damaging power. The botnet borrows some of the attack code from Mirai but also exploits known security vulnerabilities to compromise routers and security cameras. To read more:

Dark web vendors

Vendors are selling remote access to desktop PCs for as little as $3. This allows attackers to compromise RDP, which can provide an easy way into corporate networks. To read more:

DUHK Attack

The DUHK attack can be used to passively decrypt VPN and encrypted browser traffic, however it relies on implementation errors in ancient security appliances to trigger a vulnerability known for two decades. To read more:

AmosConnect 8.0

Researchers uncovered two critical security issues that would give attackers access to systems and information. The shipboard-communication platform provides satellite communications, email, fax, interoffice communication and more while at sea. To read more:

Want to learn more?

Sign up below and receive weekly breach reports directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.