Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Weekly Breach Report – February 8th 2021

Feb 8, 2021By Shaina Raskin

A snapshot of last week’s reported cybersecurity breaches and vulnerabilities

Washington State auditor

Thieves stole the personal unemployment-claim data of 1.6m people in America’s Washington State in a hack of the state auditor’s office. Seattle Times:


SonicWall SMA 100

This US internet-security company announced that hackers are actively exploiting a zero-day vulnerability in its Secure Mobile Access 100 series devices. The Hacker News:



Researchers discovered a supply-chain attack targeting online gamers by compromising the update mechanism of NoxPlayer, an Android emulator. The Hacker News:


Security patches

A security researcher revealed that software vendors are pushing inadequate or incomplete security patches. Six of the 24 zero-days exploited in 2020 were variants of previously disclosed vulnerabilities, and another three were incompletely patched. The Register:


HPC clusters

A new malware is targeting high-performance computing clusters at universities, government agencies and internet service providers. It enables attackers to execute arbitrary commands on the systems. The Hacker News:


Microsoft Defender ATP

Microsoft Defender Advanced Threat Detection labeled Google Chrome’s browser update as a backdoor trojan. System admins are waiting for Microsoft’s statement to confirm that this is a false positive and not an actual threat. ZDNet:



This French cybersecurity company announced that it had suffered a security breach. The hackers stole sensitive data and source code. Graham Cluley:



Google patched a zero-day vulnerability in Chrome that hackers are exploiting in the wild. The vulnerability is a heap buffer overflow in the V8 JavaScript rendering engine. The Hacker News:



SolarWinds pushed out fixes for three severe vulnerabilities unrelated to the original SolarWinds backdoor. Ars Technica:



The UK’s National Cyber Security Centre revealed that an unnamed company had paid £6.5m ($8.9m) to restore its network and retrieve its files following a ransomware attack. The hackers then returned, infected its systems again, and extracted a second ransom. ZDNet:



This British outsourcing company confirmed that a double extortion ransomware attack hit parts of its infrastructure in Europe. Computer Weekly:


Leon Medical Centers and Nocona General Hospital

Hackers published patient information from two US hospital chains after attempting to extort ransom for the data. NBC:


British Mensa

The British branch of Mensa, a society for “high-IQ” people, reported that it had experienced a cyberattack. Computing:


Nissan North America

Nissan North America suffered a data leak in which source code for its mobile apps and several internal tools appeared on the internet due to a misconfigured Git server. Industry Week:

A data breach on exposed personal information belonging to 427,000 site members, including sex workers and their customers. Tom’s Guide:


Foxtons Group

A data breach at Britain’s Foxtons forced the real-estate agency to shut down its customer portal. Though the company claimed no sensitive data was compromised, a recent investigation found more than 16,000 credit-card details and other information uploaded on the dark web. Tess:


Oxfam Australia

Oxfam Australia is investigating a data breach after a hacker claimed to be selling a database on a hacking forum. Bleeping Computer:


The Woodland Trust

This British conservation charity disclosed that it is investigating a cyberattack from last December. Infosecurity Magazine:

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.