Vulnerable Disclosures

The purpose of this page is to provide awareness to individuals and organizations that are leaking information and the information of their customers. The entities listed on this site are verified to be leaking personal information sometimes without the company even being aware. SLC Security is now owned and operated by Jigsaw Security Enterprise. We are currently in process and as such this blog will eventually be taken offline and merged with Jigsaw Security resources.

Wednesday, October 21, 2015

Trinity College host being used as C2 by credential stealing malware (157.252.245.49)

We notified Trinity College of the issue and have not gotten a response.
Posted by SLC at 9:04 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Breach, Trinity College
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Search for Breaches

Subscribe to the Security List

Subscribe to Security List

Archives

  • ►  2017 (2)
    • ►  May (2)
  • ►  2016 (17)
    • ►  December (3)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  June (3)
    • ►  May (1)
    • ►  February (2)
    • ►  January (4)
  • ▼  2015 (160)
    • ►  December (4)
    • ▼  October (1)
      • Trinity College host being used as C2 by credentia...
    • ►  September (2)
    • ►  August (11)
    • ►  July (14)
    • ►  June (9)
    • ►  May (8)
    • ►  April (34)
    • ►  March (16)
    • ►  February (36)
    • ►  January (25)
  • ►  2014 (284)
    • ►  December (36)
    • ►  November (42)
    • ►  October (142)
    • ►  September (64)

Visit Our Website or Get Paid Feeds

SLC Security Services LLC

Subscribe to our Commercial Threat Intelligence Service

Categories

Breach (119) News (115) Advisory (53) Disclosure (44) Alert (39) Technology Share Program (25) Activity Report (16) Attackers (14) Abuse (11) Opinion (10) Research (9) Tips (7) Misc (6) Publications (6) Botnet (5) Daily Breach List Alert (5) Compromised Host (4) Harvard (4) Training (4) wakemed (4) APT Activity (3) Brute Force Attacks (3) Government (3) Home Depot (3) Humor (3) Notice (3) Notifications (3) Stats (3) AT&T (2) Anthem (2) Belkin (2) Cape Fear Valley Health System (2) Fraud (2) JP Morgan Chase (2) K-Mart (2) Malware (2) Medical (2) Sensor Data (2) Suspicious Traffic (2) TSCM (2) UC Berkeley (2) University of Michigan (2) Updated (2) 80.82.64.201 (1) APT28 (1) Adobe (1) Adobe Flash (1) Air Methods (1) Analytic Research (1) Attacks (1) Banking (1) Bitcoin (1) Blue Cross Blue Shield (1) Boston University (1) Bowling Green Municipal Utilities (1) Breaking News (1) CVV (1) California State Polytechnic University - Pomona (CSPUP) (1) Citigroup (1) City of Greensboro (1) CocaCola Company (1) Compromised (1) Cone Health (1) Confirmed (1) Cornell (1) Cornell University (1) Credential Leaks (1) Credit Card (1) Credit One Bank (1) DMA Locker (1) DNC (1) Dairy Queen (1) Data Security Excellence Note (1) Defacement (1) Development (1) E*Trade (1) Ebola (1) Education (1) Environmental (1) Etech Group Pty Ltd (1) Failure (1) Fidelity Investments (1) Field Report (1) Gmail (1) Goodwill (1) Grace Life Church (1) Grant County (1) Grinch (1) Guardzilla (1) Hack (1) Hackers (1) Hampshire College (1) Healthcare (1) ISIS (1) Illinois Institute of Technology (1) Indiana Department of Education (1) Indicators (1) Intel (1) Jimmy Johns (1) Linksys (1) MIT (1) Microsoft (1) Motorola (1) NCUA (1) NEWS ROUNDUP (1) Netteller (1) New (1) New Life Homes LLC (1) New Services (1) Northwestern University (1) OMB (1) Open Source (1) Oregon Health and Science University (1) Owensboro Medical (1) PII (1) PNC Bank (1) PONY Malware (1) Palm Springs Federal Credit Union (1) Pastebin (1) Patch (1) Pinellas County Schools (1) Porn Sites (1) Possible Breach (1) Press Release (1) Q&A (1) RBC Bank (1) Regions Bank (1) Representative Wagners Email (1) Response (1) Routing Paths (1) Russia (1) SSH Scanning Activity (1) Software Products (1) Staples (1) Starbucks (1) State of Louisiana (1) Suntrust (1) TD Bank (1) Technical Report (1) Technologies (1) Technology Watch (1) Texas A&M University (1) The Preston Law Firm (1) Theft (1) Third Party Report (1) Time Warner Cable (1) Tor (1) Trinity College (1) Turner Broadcasting Systems (1) UMass Memorial Medical Group (1) US Air Force (1) USAF (1) University Health Systems of East Carolina Inc (1) University of California (1) University of Chicago (1) University of Maryland (1) University of Pennsylvania (1) Update (1) Utilities (1) Waffle House (1) Wake Health (1) Wall of Shame (1) Walmart (1) Warning (1) WellCare (1) White House (1) Wilson Memorial Hospital (1) Wireless Fun (1) cornell.edu (1) exposted information (1) retail (1)

Subscribe To Disclosures

Posts
Atom
Posts
All Comments
Atom
All Comments

About SLC Security



The driving factor in us deciding to provide this service to consumers is the growing cost of cybersecurity defense and notification systems. We are providing an RSS feed of content as a public service. It is our policy to only release the full details of data breach information directly to the companies or entity that was the target of the breach or attack. If you need assistance researching the source of the breach or leak please visit SLC Security Services LLC to obtain assistance.

NOTICE
: All information posted to this blog is derived from open source intelligence systems developed by SLC Security Services LLC. The OSINT-X platform is available via subscription and via a paid RSS Feed. The OSINT-X system only maintains 90 days but this timeframe may and will change without notice depending on the amount of data we are processing. We also provide a delayed RSS feed that may not contain all feed sources. The public RSS feed is on this page on the right hand side and is provided without charge. The moderators of this site are all volunteers and are not paid for their services.

If your company needs a TSCM Sweep or Vulnerability assessment feel free to contact us through the contact form on this page or call us at
(717) 831-TSCM to schedule an audit.

NOTICE: Starting in January 2015 we will only discuss issues on the blog or in our feeds with the clients directly. We receive upward of 200+ calls per day requesting information. It is impossible for our volunteers to field that number of calls and still get our work done. While we would love to help every person that calls remember we are a for profit business and answering calls takes time. If we are not busy you may get in touch with us. The best approach is to email us at soc@slcsecurity.com instead of calling. Please include your name, telephone number and a brief reason for the call or communication and we will get back to you as soon as possible time permitting.


About this Page

The purpose of this page is to provide awareness to individuals and organizations that are leaking information and the information of their customers. The entities listed on this site are verified to be leaking personal information sometimes without the company even being aware. We will include information on what type of information is being leaked but we will not release the methods in which the information is being leaked unless we are under non-disclosure agreements with the organization. The information posted on this site will contain scrubbed information if we release it to protect the information source and to ensure that the person or persons being affected are not farther harmed by the disclosure of their personal information.

Before a breach is reported it is reported to the entity affected and we normally wait at least 5 days for a response. We only post disclosures whenever there have been no response by the organization or when it involves confirmed leaks or we can verify that the security issue has not been resolved by the organization. Certain items will remain on the blog if they are a major release or new information is being posted frequently concerning the incident.

We do NOT maintain data on the leaked information as we would not want to create a second incident. Reports are submitted by security researchers, patients, clients, corporations and through open source identification as well as through passive monitoring of open source systems and proprietary algorithms.

The information on this site is provided by SLC Security Services LLC a leading cyber security and investigation company located in Raleigh, NC. If your company appears on this list and you would like additional information you may contact us by mail at 2664 Timber Dr Suite 342 Garner NC 27529 or by email via the contact form available at www.slcsecurity.com or by phone at (717)831-8726.

The Stats

Reporting Stats are available upon written request.

Please report all known security issues to soc@slcsecurity.com. We will review each report manually whenever possible. Please note that not all reports will be published to the disclosure list. Also you can specifically request that the data NOT be posted during your submission.

RSS OSINT-X FEED PERMALINK
Feed Delayed 30-60 Minutes
Not all sources we monitor are in this RSS feed. This feed contains mostly news sites but does not include IRC, Darknet or File Dump site monitoring that our commercial products monitor for your organization. This feed is limited in scope. For full access you must be a customer under a service contract. If interested in a full service contract call (919)441-7353 to inquire about pricing and services available.

TWITTER FEED
All information on this site is provided as a public service. Copyright 2014 SLC Security Services. Awesome Inc. theme. Powered by Blogger.