Weekly Cyber Threat Report – July 2017 – Week 3


Weekly Cyber Threat Report


As a Maryland Managed Service Provider, SADOS strives to provide every business up to date information on the technology news and information. In this blog post you will find a weekly report of all cyber threats provided by Symantec.

SADOS is a team of IT professionals with a deep understanding of any IT-related function.

SADOS welcomes you to contact us for a Free Business Consultation if you are interested in finding out more. Please do not hesitate to call, email, or simply stop by our office.


July 17, 2017


Ransom.Shifr –

Ransom.Shifr is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

Discovered:

July 17, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows


July 18, 2017


Exp.CVE-2017-6753

Exp.CVE-2017-6753 is a heuristic detection for files attempting to exploit the Cisco WebEx Browser Extension Remote Code Execution Vulnerability (CVE-2017-6753).

Discovered:

July 18, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-6753


July 19, 2017


Trojan.Tinukebot

Trojan.Tinukebot is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer.

July 19, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows


JS.Downloader!gen39

JS.Downloader!gen39 is a heuristic detection used to detect threats associated with the JS.Downloader family.

Discovered:

July 19, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows


July 20, 2017


Trojan.Malscript!gen3

Trojan.Malscript!gen3 is a heuristic detection used to detect threats associated with Trojan.Malscript.

Discovered:

July 20, 2017

Type:

Trojan

Systems Affected:

Windows


Backdoor.Rurtar

Backdoor.Rurtar is a Trojan horse that opens a backdoor on the compromised computer and may perform malicious activities.

Discovered:

July 20, 2017

Updated:

July 21, 2017 3:21:28 AM

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows


Trojan.Tinukebot!gm

Trojan.Tinukebot!gm is a heuristic detection used to detect threats associated with the Trojan.Tinukebot family.

Discovered:

July 20, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows


July 21, 2017


Exp.CVE-2017-8598

Exp.CVE-2017-8598 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8598).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8598


Exp.CVE-2017-8594

Exp.CVE-2017-8594 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-8594).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8594


Exp.CVE-2017-8592

Exp.CVE-2017-8592 is a heuristic detection for files attempting to exploit the Microsoft Edge and Internet Explorer Security Bypass Vulnerability (CVE-2017-8592).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8592


Exp.CVE-2017-0243

Exp.CVE-2017-0243 is a heuristic detection for files attempting to exploit the Microsoft Office Remote Code Execution Vulnerability (CVE-2017-0243).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-0243


Exp.CVE-2017-8619

Exp.CVE-2017-8619 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Code Execution Vulnerability (CVE-2017-8619).

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8619


Exp.CVE-2017-8618

Exp.CVE-2017-8618 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Code Execution Vulnerability (CVE-2017-8618).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8618


Exp.CVE-2017-8617

Exp.CVE-2017-8617 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Code Execution Vulnerability (CVE-2017-8617).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8617


Exp.CVE-2017-8605

Exp.CVE-2017-8605 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8605).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8605


Exp.CVE-2017-8601

Exp.CVE-2017-8601 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8601).

Discovered:

July 21, 2017

Type:

Trojan

Infection Length:

Varies

Systems Affected:

Windows

CVE References:

CVE-2017-8601


As a Maryland Managed Service Provider, SADOS offers a team of IT professionals with a deep understanding of any IT-related function. SADOS welcomes you to contact us for a Free Business Consultation if you are interested in finding out more. Please do not hesitate to call, email, or simply stop by our office.


Sources:

https://www.symantec.com/security_response/landing/threats.jsp#


Share

Share on facebook
Share on twitter
Share on linkedin
Share on reddit
Share on print
Share on email

Are you a business in DC/Florida/Texas?

Get IT Support from $35/mo

Serving DC, MD, VA, FL, TX
News Topics

You may also like...

News to your inbox

Keep tabs on what’s happening in the world of technology. We’ll send you new posts to your inbox

We’re committed to your privacy. SADOS uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Ready to upgrade your IT?

Book a meeting now and you'll be on your way to faster, better IT.