Cerber Ransomware

Threat Meter

 

The CERBER family of ransomware has been found to have adopted a new technique to make itself harder to detect: it is now using a new loader that appears to be designed to evade detection by machine learning solutions. This loader is designed to hollow out a normal process where the code of CERBER is instead run.

How do you protect yourself?

Ransomware is forever changing and adapting to its environment. A proactive, multilayered approach to security is more effective— from the gateway, endpoints, networks, and servers.

CVE-2018-0771

Threat Meter

 

A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins. The vulnerability allows Microsoft Edge to bypass Same-Origin Policy (SOP) restrictions, and to allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data that would otherwise be restricted.

In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. The attacker could also take advantage of compromised websites, and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.

The security update addresses the vulnerability by modifying how affected Microsoft Edge handles different-origin requests.

How do you protect yourself?

Revised the Affected Products table to include Windows 10 Version 1709 because it is affected by CVE-2018-0771. Microsoft recommends that customers running Windows 10 Version 1709 should install update 4088776 to be protected from this vulnerability.

Operation MuddyWater

Threat Meter

 

The attacks targeted victims in the United States and the Middle East in an attempt to steal sensitive information. The group behind the campaign used fake documents claiming to be from the NSA in spear-phishing emails to convince victims to open the malicious attachments.

How do you protect yourself?

Avoid opening documents from unknown senders, especially ones claiming to be from government agencies. You can read more about spear phishing here.