Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Dec 18, 2017By Shaina Raskin

A snapshot look at the breaches and reported vulnerabilities of last week


Microsoft accidentally left a Dynamics 365 TLS certificate and private key open. Unlike development and production servers, this sandbox gives admins RDP access. To read more:


The newly discovered hacking group has successfully attacked more than 20 financial institutions, banks, software vendors and law firms worldwide. The group is linked to 16 victims in the US, one in the UK and three in Russia. To read more:


The Dutch security firm has announced that it suffered a cyberattack. The attacker was able to redirect emails going to the domain and inbound traffic to their ClientPortal. The weak link was Fox-IT’s domain registrar, which did not require two-factor authentication. To read more:

Update: Mirai Botnet

The co-authors of Mirai pled guilty to creating the malware back in 2016, which crippled portions of the internet. In addition, the authors also pled guilty to charges of using their botnet to conduct click-fraud. To read more:

Reported Vulnerabilities

Language flaws

A researcher revealed serious flaws in the interpreters for five popular programming languages. Applications parsed by these languages are at risk. For example, Python has “undocumented methods and local environment variables that can be used for OS command execution.” To read more:


Starbucks has inadvertently been mining alt-coins on customers’ computers. An attacker was maliciously injecting Coin Hive’s code into web browsers via the free Starbucks wi-fi. To read more:


This adware was developed by an Israeli ad-tech firm and poses as a legitimate installer. The installer asks for users’ computer password to trick them into turning over root privileges. To read more:


The ROBOT vulnerability, first identified in 1998, has resurfaced. It impacts many major websites such as Facebook to PayPal. With the vulnerability, attackers can decrypt encrypted data and sign communications using private keys. To read more:


This family of malware is designed to compromise industrial-control systems. Specifically, it targets equipment sold by Schneider Electric, tampering with or disabling the company’s Triconex products. To read more:

Want to learn more?

Sign up below and receive weekly breach reports directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.