Cyber security news September 2021

This posting is here to collect cyber security news in September 2021.

I post links to security vulnerability news to comments of this article.

You are also free to post related links to comments.


  1. Tomi Engdahl says:

    VoIP company battles massive ransom DDoS attack
    VoIP company battles massive ransom DDoS attack. katso myös

  2. Tomi Engdahl says:

    FamousSparrow: A suspicious hotel guest
    ESET researchers have uncovered a new cyberespionage group targeting hotels, governments, and private companies worldwide. We have named this group FamousSparrow and we believe it has been active since at least 2019.. The group has been active since at least August 2019 and it mainly targets hotels worldwide. In addition, we have seen a few targets in other sectors such as governments, international organizations, engineering companies and law firms

  3. Tomi Engdahl says:

    Hackers are scanning for VMware CVE-2021-22005 targets, patch now!
    Threat actors have already started targeting Internet-exposed VMware vCenter servers unpatched against a critical arbitrary file upload vulnerability patched yesterday that could lead to remote code execution.

  4. Tomi Engdahl says:

    Apple fixes another zero-day used to deploy NSO iPhone spyware
    Apple has released security updates to fix three zero-day vulnerabilities exploited in the wild by attackers to hack into iPhones and Macs running older iOS and macOS versions.

  5. Tomi Engdahl says:

    Törkeä huijaus Iltalehden nimissä valeuutinen lupaa tuhansien eurojen voittoja
    Verkkorikolliset ovat luoneet sivuston, joka jäljittelee Iltalehden aitoa sivustoa.

  6. Tomi Engdahl says:

    100M IoT Devices Exposed By Zero-Day Bug
    A high-severity vulnerability could cause system crashes, knocking out sensors, medical equipment and more.. see also

  7. Tomi Engdahl says: Website Inaccessible After Being Hacked by Apparent Giveaway Scam
    The site could not be opened as of 05:44 UTC Thursday, after falling victim earlier in the day to an attack claiming it would double funds sent to it.

  8. Tomi Engdahl says:

    Google finds adware strain abusing novel file signature evasion technique
    One of Googles security teams said it found a malware strain abusing a new technique to evade detection from security products by cleverly modifying the digital signature of its payloads.

  9. Tomi Engdahl says:

    REVil ransomware devs added a backdoor to cheat affiliates
    Cybercriminals are slowly realizing that the REvil ransomware operators may have been hijacking ransom negotiations, to cut affiliates out of payments.

  10. Tomi Engdahl says:

    Researchers Find Malware Hiding in Windows Subsystem for Linux
    Black Lotus Labs revealed on Thursday that it’s discovered new malware that uses the Windows Subsystem for Linux (WSL) to avoid being detected by security tools.

  11. Tomi Engdahl says:

    Apple Confirms New Zero-Day Attacks on Older iPhones

    Apple on Thursday confirmed a new zero-day exploit hitting older iPhones and warned that the security vulnerability also affects the macOS Catalina platform.

    This is the 16th documented in-the-wild zero-day exploitation of security defects in Apple’s iOS and macOS platforms so far this year.

    “Apple is aware of reports that an exploit for this issue exists in the wild,” the company said without elaborating. No other details of IOCs (indicators of compromise) were provided.

    The Cupertino, Calif. software giant credited researchers at Google with intercepting the new zero-day exploit, which affects a list of older iPhones and iPads running the out-of-support iOS 13 devices like the iPad Air, the iPad mini, iPhone 5s, iPhone 6, and iPhone 6 Plus.

  12. Tomi Engdahl says:

    Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others

    Bluetooth has become widely popular since its introduction in 1999. However, it’s also had its fair share of security problems over the years. Just recently, a research group from the Singapore University of Technology and Design found a serious vulnerability in a large variety of Bluetooth devices. Having now been disclosed, it is known as the BrakTooth vulnerability.

    Full details are not yet available; the research team is waiting until October to publicly release proof-of-concept code in order to give time for companies to patch their devices. The basic idea however, is in the name. “Brak” is the Norweigan word for “crash,” with “tooth” referring to Bluetooth itself. The attack involves repeatedly attempting to crash devices to force them into undesired operation.

    The Espressif ESP32 is perhaps one of the worst affected. Found in all manner of IoT devices, the ESP32 can be fooled into executing arbitrary code via this vulnerability, which can do everything from clearing the devices RAM to flipping GPIO pins. In smart home applications or other security-critical situations, this could have dire consequences.

    BRAKTOOTH: Causing Havoc on Bluetooth Link Manager

  13. Tomi Engdahl says:

    L-O-L! Fines for paying ransomware….hi-larious. Maybe now they will back up their data?

    (Spoiler alert: they won’t)

  14. Tomi Engdahl says:

    Hackers breached computer network at key US port but did not disrupt operations

    (CNN) – Suspected foreign government-backed hackers last month breached a computer network at one of the largest ports on the US Gulf Coast, but early detection of the incident meant the intruders weren’t in a position to disrupt shipping operations, according to a Coast Guard analysis of the incident obtained by CNN and a public statement from a senior US cybersecurity official.

    The incident at the Port of Houston is an example of the interest that foreign spies have in surveilling key US maritime ports, and it comes as US officials are trying to fortify critical infrastructure from such intrusions.

  15. Tomi Engdahl says:

    Illusionofchaos / Habr:NEW
    Researcher discloses three iOS zero-days, says they were reported to Apple before May 4 and are still exploitable in iOS 15 after Apple failed to fix them — Information Security *Development for iOS *Development of mobile applications *Reverse engineering *

    Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program

  16. Tomi Engdahl says:

    EU warns Russia over ‘Ghostwriter’ hacking ahead of German elections

    The European Union has warned it may take action over Russia’s involvement in “malicious cyber activities” against several EU member states.

    The “Ghostwriter” campaign targeted “numerous members of Parliaments, government officials, politicians, and members of the press and civil society in the EU”, according to a press release from the European Council on Friday, and was carried out “by accessing computer systems and personal accounts and stealing data.”

    The statement by the European executive, comprised of the bloc’s heads of state, said the EU was considering “taking further steps,” but did not elaborate what actions it would take.

  17. Tomi Engdahl says:

    REvil: We Accidentally Leaked Kaseya Universal Decryptor Key

    ‘One of our coders misclicked and generated a universal key, and issued the universal decryptor key along with a bunch of keys for one machine. That’s how we sh*t ourselves,’ says REvil on a Russian-language forum.

  18. Tomi Engdahl says:

    BrakTooth vulnerabilities impact closed-source Bluetooth stacks used in chips from Espressif, Intel, Qualcomm…

    BrakTooth is a family of new security vulnerabilities in commercial, closed-source Bluetooth Classic stacks that range from denial of service (DoS) via firmware crashes and deadlocks to arbitrary code execution (ACE) in certain IoT devices.

  19. Tomi Engdahl says:

    Researchers Find Malware Hiding in Windows Subsystem for Linux
    By Nathaniel Mott 9 days ago
    The malware targeted WSL to evade detection mechanisms.

  20. Tomi Engdahl says:

    Google Issues Warning For 2 Billion Chrome Users

    Chrome users beware, just days after I warned attacks on Google’s browser are increasing, another critical hack has been confirmed.

    Google published the news in a new blog post, where it revealed Chrome’s 11th ‘zero day’ exploit of the year has been found (CVE-2021-37973) and it affects Linux, macOS and Windows users. A zero-day classification means hackers have been able to exploit the flaw before Google could release a fix, which makes it significantly more dangerous than most security flaws. Google confirmed this saying it “is aware that an exploit for CVE-2021-37973 exists in the wild”.

    Interestingly, the new zero-day is yet another ‘Use-After-Free’ (UAF) vulnerability

    When you are able to update, remember Chrome must be restarted for the fix to take effect. Chrome is now used by over 2.65 billion users worldwide making it a huge target for hackers and, while Google is doing its part to counter attacks, they can find easy prey among users who fail to complete that crucial final step. Don’t be one of them.

  21. Tomi Engdahl says:

    SonicWall warns users to patch critical vulnerability as soon as possible
    SonicWall has issued a security notice about its SMA 100 series of appliances. The vulnerability could potentially allow a remote unauthenticated attacker the ability to delete arbitrary files from a SMA 100 series appliance and gain administrator access to the device.

  22. Tomi Engdahl says:

    Uusi pankkihuijaus haluaa tunnukset 8 tunnissa erottaisitko itse tämän sivun aidosta?
    SÄHKÖPOSTITSE levitetään parhaillaan Nordean nimissä huijausta, jossa käyttäjälle esitetään vaatimus tunnistautua uudelleen kahdeksan tunnin kuluessa sähköpostin saamisesta lukien.

  23. Tomi Engdahl says:

    Uudenlainen huijaus: Varo maksu­pyyntöä MobilePayssa Kelan nimissä
    KELA varoittaa nimissään MobilePay-rahansiirtosovelluksessa tehtävästä huijauksesta. Maksupyyntö on naamioitu etuisuuden takaisinmaksupyynnöksi.. katso myös

  24. Tomi Engdahl says:

    Major European call center provider goes down in ransomware attack
    GSS, the Spanish and Latin America division of Covisian, one of Europes largest customer care and call center providers, has suffered a debilitating ransomware attack that froze a large part of its IT systems and crippled call centers across its Spanish-speaking customerbase.

  25. Tomi Engdahl says:

    German Election: Phishing Attacks and Disinformation Campaigns Target Parliament Members

  26. Tomi Engdahl says:

    EU officially blames Russia for ‘Ghostwriter’ hacking activities
    The European Union has officially linked Russia to a hacking operation known as Ghostwriter that targets high-profile EU officials, journalists, and the general public.. “These malicious cyber activities are targeting numerous members of Parliaments, government officials, politicians, and members of the press and civil society in the EU by accessing computer systems and personal accounts and stealing data,” European Council officials said in a press release today.. see also

  27. Tomi Engdahl says:

    Researcher drops three iOS zero-days that Apple refused to fix
    Proof-of-concept exploit code for three iOS zero-day vulnerabilities (and a fourth one patched in July) was published on GitHub after Apple delayed patching and failed to credit the researcher.

  28. Tomi Engdahl says:

    Emergency Google Chrome update fixes zero-day exploited in the wild
    Google has released Chrome 94.0.4606.61 for Windows, Mac, and Linux, an emergency update addressing a high-severity zero-day vulnerability exploited in the wild.

  29. Tomi Engdahl says:

    Bug in macOS Finder allows remote code execution
    While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented

  30. Tomi Engdahl says:

    State-sponsored hacking group targets Port of Houston using Zoho zero-day
    A suspected state-sponsored hacking group has attempted to breach the network of the Port of Houston, one of the largest port authorities in the US, using a zero-day vulnerability in a Zoho user authentication appliance, CISA officials said in a Senate hearing today.

  31. Tomi Engdahl says:

    Exploits imminent for critical VMware vCenter CVE-2021-22005 bug
    Exploit code that could be used to achieve remote code execution on VMware vCenter Server vulnerable to CVE-2021-22005 is currently spreading online.

  32. Tomi Engdahl says:

    Onko kiinalainen puhelin vaarallinen? Näin kommentoivat viran­omainen ja tieto­turva-asian­tuntija
    Liettualaisten löydökset herättivät pelkoa kiinalaispuhelimiin.
    Asiantuntijoiden mukaan kyse ei ole yhteen maahan liittyvästä ongelmasta. Kuluttajan asema on kuitenkin vaikea.

  33. Tomi Engdahl says:

    VMware vCenter Server Vulnerability CVE-2021-22005 Under Active Exploit
    On September 21, 2021, VMware disclosed that its vCenter Server is affected by an arbitrary file upload vulnerabilityCVE-2021-22005in the Analytics service. A malicious cyber actor with network access to port
    443 can exploit this vulnerability to execute code on vCenter Server.

  34. Tomi Engdahl says:

    FBI decision to withhold Kaseya ransomware decryption keys stirs debate
    Many security experts defended the FBI’s decision to leave Kaseya victims struggling with ransomware infections for weeks.

  35. Tomi Engdahl says:

    United Health Centers ransomware attack claimed by Vice Society
    California-based United Health Centers suffered a ransomware attack that reportedly disrupted all of their locations and resulted in patient data theft.

  36. Tomi Engdahl says:

    Russian missile fuel maker targeted with recent Office zero-day
    Russian organizations, including a major defense contractor, have been targeted in a suspected cyber-espionage operation that is abusing a recently disclosed Office zero-day.

  37. Tomi Engdahl says:

    Large-Scale Phishing-as-a-Service Operation Exposed
    Discovery of BulletProofLinkwhich provides phishing kits, email templates, hosting and other toolssheds light on how wannabe cybercriminals can get into the business.


Leave a Comment

Your email address will not be published. Required fields are marked *