July 7, Softpedia – (International) New “Patchwork” cyber-espionage group uses copy-pasted malware for its attacks. Security researchers from Cymmetria reported that a new cyber-espionage group dubbed, Patchwork Advanced Persistent Threat (APT) was seen infecting at least 2,500 machines since December 2015 and can infect an underlying operating system (OS) with their malware using spear-phishing emails that contain PowerPoint files as attachments, which are embedded with the Sandworm exploit. The cyber criminals use an assortment of copy-pasted code from known malware such as PowerSploit, Meterpreter, Autolt, and UACME. Source
July 8, Softpedia – (International) D-Link vulnerability affects over 120 products, 400,000 devices. Security researchers from Senrio discovered that over 120 other D-Link products were plagued with the same remote-code execution (RCE) vulnerability found in the D-Link DCS-930L Network Cloud Cameras that could allow attackers to execute arbitrary code on the devices. Researchers reported that an alleged 400,000 D-Link products could be affected. Source
July 8, Softpedia – (International) Zero-days in BMW web portal let hackers tamper with customer cars. A security researcher from Vulnerability Lab reported July 7 that BMW’s ConnectDrive Web portal was plagued with two zero-day vulnerabilities including a cross-site scripting (XSS) flaw and a session vulnerability that can allow an attacker to bypass Vehicle Identification Number (VIN) session validation and use another car’s VIN to access and edit another user’s car settings. BMW has yet to patch the flaws. Source
Above Reprinted from the USDHS Daily Open Source Infrastructure Report