Overt Operator

Share this post
Daily Cyber Brief
www.overtoperator.com
Daily Cyber Brief

Daily Cyber Brief

2 energy companies in Luxembourg are hit by a ransomware attack, NK APTs are deploying malicious extensions, and an Austrian investigation revealed spyware targeting legal and financial sectors...

Overt Operator
Aug 2
Share this post
Daily Cyber Brief
www.overtoperator.com

Cybersecurity

Australian Hacker Charged with Creating, Selling Spyware to Cyber Criminals

A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic violence perpetrators and child sex offenders. Jacob Wayne John Keen, who currently resides at Frankston, Melbourne, is said to have created the…

Luxembourg energy companies struggling with alleged ransomware attack, data breach

Two companies based in Luxembourg are grappling with an alleged ransomware attack that began last week, the latest in a string of incidents involving European energy companies. Encevo Group said its Luxembourg entities Creos – an energy network operator – and the…

Steam, PayPal blocked as Indonesia enforces new Internet regulation

The Indonesian Ministry of Communication and Information Technology, Kominfo, is now blocking access to internet service and content providers who had not registered on the country's new licensing platform by July 27th, 2022, as the country begins to restrict access…

At least 34 healthcare orgs affected by alleged ransomware attack on OneTouchPoint

A ransomware attack on printing and mailing services provider OneTouchPoint is having several downstream effects on its customers, prompting it to release a data breach notice last week on behalf of 34 healthcare organizations. OneTouchPoint provides its services to…

Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys

Researchers have uncovered a list of 3,207 apps, some of which can be utilized to gain unauthorized access to Twitter accounts. The takeover is made possible, thanks to a leak of legitimate Consumer Key and Consumer Secret information, respectively, Singapore-based…

Chromium Browsers Allow Data Exfiltration via Bookmark Syncing

Bookmark synchronization has become a standard feature in modern browsers: It gives Internet users a way to ensure that the changes they make to bookmarks on a single device take effect simultaneously across all their devices. However, it turns out that this same…

North Korean Hackers Use Browser Extension to Spy on Gmail and AOL Accounts

Cybersecurity firm Volexity spotted new activity from a threat actor (TA) allegedly associated with North Korea and deploying malicious extensions on Chromium-based web browsers. A recent advisory from the security researchers dubbed this new TA SharpTongue, despite it…

LockBit Ransomware Abuses Windows Defender for Payload Loading

A LockBit ransomware operator or affiliate has been abusing Windows Defender to decrypt and load Cobalt Strike payloads during attacks, according to endpoint security firm SentinelOne. In April, SentinelOne reported that, in an attack involving LockBit…

Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers

The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated techniques to compromise unsuspecting victims. "In the past, Gootkit used freeware installers to mask malicious files; now it uses legal documents to trick users into downloading…

Austrian Investigation Reveals Spyware Targeting Law Firms, Finance Institutions

The Austrian government said on Friday it was investigating a company based within the nation’s territory for allegedly developing spyware targeting law firms, banks, and consultancies across at least three countries. The news comes days after Microsoft’s…

Share this post
Daily Cyber Brief
www.overtoperator.com
Comments

Create your profile

0 subscriptions will be displayed on your profile (edit)

Skip for now

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.

TopNewCommunity

No posts

Ready for more?

© 2022 Overt Operator
Privacy ∙ Terms ∙ Collection notice
Publish on Substack Get the app
Substack is the home for great writing