WEEKLY TOP TEN | MAY 6, 2022 13:01 GMT
Our Threat Operations and Intelligence team compiles a daily digest of new cybersecurity threats from around the Internet. This top 10 has been culled from the 40+ unique stories we found relevant over the week, ranked by highest risk:
- AvosLocker Variant Abusing Legitimate Security Driver and Log4Shell to Propagate
https://www.trendmicro.com/en_us/research/22/e/avoslocker-ransomware-variant-abuses-driver-file-to-disable-anti-Virus-scans-log4shell.html - Kaspersky Discovers Fileless Malware Injecting Into Windows Event Logs For Defense Evasion
https://threatpost.com/attackers-use-event-logs-to-hide-fileless-malware/179484/ - Emotet Botnet Operators Testing New Techniques in Advance of Windows VBA Macro Changes
https://securityaffairs.co/wordpress/130739/cyber-crime/emotet-operators-test-new-techniques.html - Synology Discloses Multiple Vulnerabilites in QNAP NAS Devices via Netatalk Security Flaws
https://securityaffairs.co/wordpress/130778/hacking/synology-netatalk-vulnerabilities.html - SentinelOne Officially Discloses Avast Driver Flaw Allowing for Disabling of Security Products and Code Execution
https://securityaffairs.co/wordpress/130944/security/avast-avg-antivirus-flaws.html - Threat Actor UNC3524 Performing Bulk Email Collection To Support Espionage Campaign Focused on Operational Security and Longer Dwell Times
https://www.mandiant.com/resources/unc3524-eye-spy-email - Security Researchers Discover Multi-year Winnti Campaign That Stole Troves of Intellectual Property Data
https://www.computerweekly.com/news/252516710/Intellectual-property-theft-operation-attributed-to-Winnti-group - CoFense Discusses Leaked Conti Logs, Focusing on Phishing and Threat Selection Methodology
https://www.infosecurity-magazine.com/blogs/phishing-takeaways-from-the-conti/ - Pro-Ukraine Hackers Abusing Docker Installs to Launch DDoS Attacks Against Russian Organizations
https://securityaffairs.co/wordpress/130901/cyber-warfare-2/docker-images-ddos-attack-russia.html - Security Researcher Discovers Vulnerability in Several Ransomware Samples, Preventing Encryption via DLL Hijacking
https://securityaffairs.co/wordpress/130883/malware/stoppin-ransomware-with-dll-hijacking.html