{"id":24529,"date":"2019-01-19T13:37:10","date_gmt":"2019-01-19T13:37:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/"},"modified":"2019-01-19T13:37:10","modified_gmt":"2019-01-19T13:37:10","slug":"ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/","title":{"rendered":"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/08\/24\/shutterstock_sleepingguard.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> This week we wrangled with <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/18\/russia_hack_democrats\/\">alleged Russian<\/a> election meddling, hundreds of millions of username-password combos <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/17\/770m_emails_passwords_breach_collection_1\/\">spilled online<\/a>, Oracle <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/18\/new_oracle_bugs\/\">mega-patches<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/17\/rico_charge_crypto_crime\/\">cliams of RICO swap-gangs<\/a>.<\/p>\n<p>While all that was happening, here are a few more bits and bytes of infosec news.<\/p>\n<h3 class=\"crosshead\"><span>Swipe right\u2026 to steal private info for Safari<\/span><\/h3>\n<p>It seems a new weakness in the Mac Pro has been uncovered by a swipe-happy bug-hunter.<\/p>\n<p>Security boffin Dhiraj Mishra says that Apple&#8217;s high-end notebook can be tricked into handing over private information via its multi-gesture trackpad. <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.inputzero.io\/2019\/01\/i-swiped-right-macos-bug.html\">Mishra explains<\/a> that Safari fails to clear out some dynamic data (such as the contents of logged-out email accounts) when it activates the swipe gesture to move between pages.<\/p>\n<p>What does this mean? Well, take for example the video demo below.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=XjkqU3wyfGc\" data-media=\"x-videoplayer\">Youtube Video<\/a><\/p>\n<div class=\"boxout\" readability=\"15.970944309927\">\n<p><strong>An insecure Android file manager app<\/strong>, ES File Explorer, with 100-million-plus downloads, opens a HTTP web server to the local network, allowing any miscreant able to reach the device <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/fs0c131y\/status\/1085460755313508352\">to download files at will<\/a>, and all list your apps and documents (CVE-2019-6447). A new version of the manager is available with this security hole plugged, so if you&#8217;re using this software, go grab it from the official Play Store.<\/p>\n<\/div>\n<h3 class=\"crosshead\"><span>Canadian fraudster betrayed by sloppy typeface<\/span><\/h3>\n<p>A crook in the Great White North has been put on ice after he was betrayed by his fonts.<\/p>\n<p>According to this account from <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/nationalpost.com\/news\/canada\/canadian-fraudster-foiled-because-he-used-the-wrong-font\">the National Post<\/a>, a former telco exec going through bankruptcy proceedings, had produced two legal documents claiming a pair of his properties were held in a public trust, and thus protected from seizure by the bank.<\/p>\n<p>Unfortunately, a review of the documents found that the typeface in both had been invented after the papers were said to have been drafted up and signed. One document was said to have been written, printed and signed in 1995 but used a font only released in 2002, and the other said to have been written and signed in 2004 used a font released in 2007. The papers were thus proved to be forged, and his claims the properties were shielded from seizure were invalidated.<\/p>\n<p>The moral of the story: always forge in Times New Roman.<\/p>\n<h3 class=\"crosshead\"><span>VOIPO-No! IP yak tool leaks data<\/span><\/h3>\n<p>Yes, we have yet another case of an unsecured cloud data store being unearthed via a Shodan search.<\/p>\n<p>This time, the info silo was an insecurely configured AWS Elastic Search instance run by Voipo, a VoIP service based in California.<\/p>\n<p>Justin Paine, Cloudflare security bod by day and breaker of internet things by night, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/rainbowtabl.es\/2019\/01\/15\/voipo-data-leak\/\">found that<\/a> the exposed database include things like call and SMS logs as well as some internal documents. The open database was privately reported and sealed up before public disclosure this week.<\/p>\n<p>Now would be a good time to go back over your cloud database and storage instances to make sure everything is locked down properly.<\/p>\n<h3 class=\"crosshead\"><span>China job-seekers get some unwanted recruiting help<\/span><\/h3>\n<p>When is exposure not a good thing for job-hunters? When it&#8217;s the unintended breach of more than 200 million CVs containing detailed personal information.<\/p>\n<p>Researcher Bob Diachenko <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.hackenproof.com\/industry-news\/202-million-private-resumes-exposed\">discovered<\/a> an unprotected database that contained hundreds of millions of extremely detailed CVs from people in China looking for work.<\/p>\n<p>Aside from job experience and references, the documents included things like personal phone numbers and marital status, height and weight, and ID and driver&#8217;s license numbers.<\/p>\n<p>Once again, the culprit was a MongoDB database that had been left open to public access, and thus was able to be crawled via BinaryEdge.<\/p>\n<h3 class=\"crosshead\"><span>Project Zero flushes out kernel bugs<\/span><\/h3>\n<p>Bug-finder Jann Horn of Google&#8217;s esteemed Project Zero crew has provided an interesting look into a particularly insidious class of bugs in operating system kernels, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1695\">in particular in this case, Linux<\/a>.<\/p>\n<p>The vulnerabilities lie in TLB (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/wiki.osdev.org\/TLB\">Translation Lookaside Buffer<\/a>) flushing. Should something go wrong with those operations, potentially sensitive system information can end up being exposed to user processes.<\/p>\n<p>&#8220;Such bugs can, if the timing works out for the attacker, provide very strong exploitation primitives for local attacks; and they are hard to discover unless you are manually looking for them,&#8221; Horn explained.<\/p>\n<p>&#8220;They are probably not a big bug class, but occasionally, bugs in TLB flushing logic do happen.&#8221;<\/p>\n<p>You can read the full post <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/googleprojectzero.blogspot.com\/2019\/01\/taking-page-from-kernels-book-tlb-issue.html\">here<\/a>.<\/p>\n<h3 class=\"crosshead\"><span>DDoS-for-hire scheme lands African telco in hot water<\/span><\/h3>\n<p>Last week we reported on the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/01\/14\/liberian_hackerforhire_case\/\">32-month sentence<\/a> handed out to the hacker behind a massive Mirai botnet attack on a Liberian telco.<\/p>\n<p>Now, it seems that the rival who paid for the attack could also find themselves in legal trouble. Cellcom is <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.zdnet.com\/article\/liberian-isp-sues-rival-for-hiring-hacker-to-attack-its-network\/\">reportedly facing<\/a> a suit from Lonestar Cell for allegedly bankrolling the massive sustained DDoS that Lonestar suffered at the hands of hacker Daniel Kaye in late 2016.<\/p>\n<p>In addition to Cellcom itself, the suit is also said to name Kaye and a pair of company executives as defendants in the case. Lonestar is seeking damages to cover the lost revenues it incurred while dealing with the attack.<\/p>\n<h3 class=\"crosshead\"><span>Tenable blows holes in building security system<\/span><\/h3>\n<p>A report this week <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.tenable.com\/blog\/multiple-zero-days-in-premisys-identicard-access-control-system\">from Tenable<\/a> outlines how multiple zero-day flaws in the Identicard PremiSys building security and surveillance systems could be used to bypass access protections.<\/p>\n<p>According to the researchers, the PremiSys hardware contained bugs such as hardcoded credentials, weak encryption, and default credentials could all be used to open databases, harvest credentials, and collect information needed to manipulate both building controls and surveillance databases.<\/p>\n<p>Perhaps worst of all was the complete lack of response the Tenable crew got after issuing their report.<\/p>\n<p>&#8220;According to Tenable\u2019s disclosure timeline, multiple attempts were made to contact the vendor to address these vulnerabilities,&#8221; Tenable said.<\/p>\n<p>&#8220;The Computer Emergency Response Team (CERT) was notified of these vulnerabilities. As of January 9, the vendor hasn\u2019t responded. The 90-day disclosure period ended on January 3, 2019.&#8221; \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/01\/19\/180119_security_roundup\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus, Safari security foiled by\u2026 a finger swipe? Roundup\u00a0 This week we wrangled with alleged Russian election meddling, hundreds of millions of username-password combos spilled online, Oracle mega-patches, and cliams of RICO swap-gangs.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24530,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-24529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-19T13:37:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc\",\"datePublished\":\"2019-01-19T13:37:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/\"},\"wordCount\":975,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/\",\"name\":\"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg\",\"datePublished\":\"2019-01-19T13:37:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg\",\"width\":650,\"height\":488},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/","og_locale":"en_US","og_type":"article","og_title":"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-19T13:37:10+00:00","og_image":[{"width":650,"height":488,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc","datePublished":"2019-01-19T13:37:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/"},"wordCount":975,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/","url":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/","name":"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg","datePublished":"2019-01-19T13:37:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc.jpg","width":650,"height":488},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ddos-sueball-felonious-fonts-leaky-android-file-manager-blundering-building-security-etc-etc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"DDoS sueball, felonious fonts, leaky Android file manager, blundering building security, etc etc"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24529"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24529\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24530"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}