Week in review

AUSCERT Week In Review for November 25th 2022

Greetings, Australians have recently been subjected to situations that have tested the resilience and resolve of most of us. Weather events, the lingering presence of COVID and, as seen recently, cyber-attacks, have individually and collectively, taken their toll. The spate of security breaches, including Optus and Medibank, doesn’t only concern identity theft or money. An individual’s mental health can also be affected, with feelings of vulnerability, anger, and being violated. IDCARE is Australia and New Zealand’s national identity and cyber support service, assisting those that have been impacted by data breaches, through effective response and mitigation. If you or someone you know might need help, it’s worth reaching out. Digital billboards are now commonplace, going beyond Times Square in New York, and popping up in cities and suburbia alike. Recently, a billboard in Brisbane was hacked, showing pornographic images, visible to passers-by on a busy road, for three minutes. This case demonstrates a vulnerability with the convergence of information technology (IT) systems and operational technology (OT) as part of the global digital transformation. Integrating cloud computing, e-commerce, industrial control systems, automated manufacturing and more, the benefits of convergence between IT and OT systems are many, but so are the potential cybersecurity threats for the converged environment. A Forbes article published earlier in the year discusses potential strategies to help bridge the cybersecurity gap of ITOT Convergence. With all this going on concurrently, evolving and stretching out for indefinite periods, it may be hard to know where to look for answers. Luckily, AUSCERT’s podcast series, Share Today, Save Tomorrow features episodes ‘ITOT Convergence’, ‘Understanding and Combatting Cyber Attacks’ and our brand new episode ‘Digital Forensics and Incident Response’, to name but a few. So, peruse what’s on offer, there’s sure to be something for everybody! Essential Eight Maturity Model Date: 2022-11-24 Author: Cyber.gov.au [ACSC has updated the Essential Eight Maturity Model] The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are the Essential Eight. Hackers breach energy orgs via bugs in discontinued web server Date: 2022-11-22 Author: Bleeping Computer Microsoft said today that security vulnerabilities found to impact a web server discontinued since 2005 have been used to target and compromise organizations in the energy sector. As cybersecurity company Recorded Future revealed in a report published in April, state-backed Chinese hacking groups (including one traced as RedEcho) targeted multiple Indian electrical grid operators, compromising an Indian national emergency response system and the subsidiary of a multinational logistics company. WhatsApp data leak: 500 million user records for sale Date: 2022-11-24 Author: Cybernews On November 16, an actor posted an ad on a well-known hacking community forum, claiming they were selling a 2022 database of 487 million WhatsApp user mobile numbers. The dataset allegedly contains WhatsApp user data from 84 countries. Threat actor claims there are over 32 million US user records included. Another huge chunk of phone numbers belongs to the citizens of Egypt (45 million), Italy (35 million), Saudi Arabia (29 million), France (20 million), and Turkey (20 million). The dataset for sale also allegedly has nearly 10 million Russian and over 11 million UK citizens’ phone numbers. NSW govt eyes law change to spur ‘good faith’ hacking Date: 2022-11-22 Author: Innovation Aus The New South Wales government will push for changes to Commonwealth criminal laws to prevent cybersecurity researchers being prosecuted for reporting potential bugs and vulnerabilities, including in the systems of public sector agencies, in “good faith”. Customer Service and Digital Government minister Victor Dominello is planning to pursue the changes before he retires from politics in March 2023, to pave the way for the state’s first whole-of-government policy framework for cyber security vulnerability disclosure. Google releases 165 YARA rules to detect Cobalt Strike attacks Date: 2022-11-21 Author: Bleeping Computer The Google Cloud Threat Intelligence team has open-sourced YARA Rules and a VirusTotal Collection of indicators of compromise (IOCs) to help defenders detect Cobalt Strike components in their networks. Security teams will also be able to identify Cobalt Strike versions deployed in their environment using these detection signatures. Lorenz Ransomware Alert: Risk to Healthcare, Public Sector Date: 2022-11-24 Author: Bankinfo Security Large healthcare and public sector organizations are continuing to get hit by attackers wielding Lorenz ransomware, cybersecurity experts warn. “It is used to target larger organizations in what is called ‘big-game hunting,’ and publishes data publicly as part of pressuring victims in the extortion process,” according to a new security alert from the U.S. Department of Health and Human Services. “Relatively little is known about Lorenz as compared to many other ransomware operators,” says HHS’ Health Sector Cybersecurity Coordination Center, or HC3. ESB-2022.6094 – Git: CVSS (Max): 8.8 Kevin Backhouse discovered that Git incorrectly handled certain command strings. An attacker could possibly use this issue to arbitrary code execution. ESB-2022.6112 – IBM QRadar: CVSS (Max): 9.8 IBM QRadar Network Security is affected by multiple vulnerabilities. ESB-2022.6133 – Ruby: CVSS (Max): 8.8 Ruby 2.7.7 has been released and this release includes a few security fix. ESB-2022.6139 – nginx: CVSS (Max): 7.4 SUSE released an update that fixed the ALPACA attack that limiting the number of errors after closing a connection. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week In Review for November 18th 2022

Greetings, With the increasing frequency and, in some cases severity, of recent cyber attacks in Australia, now might be the time to look back at this year’s AUSCERT2022 conference presentations. Covering a range of topics from Incident Response and Handling to Governance, Risk Management and Compliance and of course, Cybercrime, there is a wealth of knowledge and experience from over 50 presenters available for your education and enjoyment! As Australia’s growing digital economy requires individuals to increase the frequency and amount of personal and sensitive data to access services, greater reforms and protection for consumers are needed. This has been made abundantly clear and reinforced by recent cyber attacks. The New South Wales government has recently launched a pilot program, part of a 2015 strategy, that will allow individuals to store their encrypted information on their own device, not held by a government agency or private entity. In case you weren’t aware, November 18 (that’s today) is the 94th birthday of the world’s most famous mouse, Mickey! That’s right, the perennial favourite of children and the young at heart, Mickey Mouse, has been around for almost a century. From the ground-breaking short film ‘Steamboat Willie’ (which was released on this day) to the global sensation he is today, this icon can inspire joy, elicit smiles, and spark the imagination. Mickey’s birthday is the perfect excuse to enjoy some family fun by grabbing some snacks and watching a classic animated film! Advanced threat predictions for 2023 Date: 2022-11-14 Author: Securelist It is fair to say that since last year’s predictions, the world has dramatically changed. While the geopolitical landscape has durably shifted, cyberattacks remain a constant threat and show no signs of receding – quite the contrary. No matter where they are, people around the world should be prepared for cybersecurity incidents. A useful exercise in that regard is to try to foresee the future trends and significant events that might be coming in the near future. We polled our experts from the GReAT team and have gathered a small number of key insights about what APT actors are likely to focus on in 2023. But first, let’s examine how they fared with the predictions for 2022. Why CVE Management as a Primary Strategy Doesn’t Work Date: 2022-11-12 Author: Dark Reading While IT and security teams dislike CVEs because of the threat they pose and the mountain of remediation work they create for them, what troubles me is the way our modern security procedures relate to CVEs. Our mitigation strategies have become too focused on “vulnerability management” and are too CVE-centric, when what we really need is a hacker-centric approach to effectively reduce our exposure. Unpatched Zimbra Platforms Are Probably Compromised, CISA Says Date: 2022-11-15 Author: Dark reading Security teams running unpatched, Internet-connected Zimbra Collaboration Suites (ZCS) should just go ahead and assume compromise, and take immediate detection and response action. That’s according to a new alert issued by the Cybersecurity and Infrastructure Security Agency, which flagged active Zimbra exploits for CVE-2022-24682, CVE-2022-27924, CVE-2022-27925, which are being chained with CVE-2022-37042, and CVE-2022-30333. The attacks lead to remote code execution and access to the Zimbra platform. Australia sets up 100-strong permanent ‘operation’ to target hackers Date: 2022-11-12 Author: iTnews Australia will set up a permanent operation comprising around 100 police and defence personnel to “hack the hackers”, with an immediate priority to target ransomware groups. Updated RapperBot malware targets game servers in DDoS attacks Date: 2022-11-16 Author: Bleeping Computer The Mirai-based botnet ‘RapperBot’ has re-emerged via a new campaign that infects IoT devices for DDoS (Distributed Denial of Service) attacks against game servers. The malware was discovered by Fortinet researchers last August when it used SSH brute-forcing to spread on Linux servers. By tracing its activities, the researchers found that RapperBot has been operational since May 2021, but its exact goals were hard to decipher. The recent variant uses a Telnet self-propagation mechanism instead, which is closer to the approach of the original Mirai malware. MFA Fatigue attacks are putting your organization at risk Date: 2022-11-15 Author: Bleeping Computer The rapid advancement of technology in all industries has led to the threat of ever-increasing cyberattacks that target businesses, governments, and individuals alike. A common threat targeting businesses is MFA fatigue attacks—a technique where a cybercriminal attempts to gain access to a corporate network by bombarding a user with MFA prompts until they finally accept one. MFA refers to multi-factor authentication, a layered end-user verification strategy to secure data and applications. For a user to log in, an MFA system needs them to submit various combinations of two or more credentials. Misconfigurations, Vulnerabilities Found in 95% of Applications Date: 2022-11-16 Author: Dark Reading Nearly every application has at least one vulnerability or misconfiguration that affects security and a quarter of application tests found a highly or critically severe vulnerability, a new study shows. Weak SSL and TLS configuration, missing Content Security Policy (CSP) header, and information leakage through server banners topped the list of software issues with security implications, according to findings in software and hardware tools conglomerate Synopsys’ new Software Vulnerabilities Snapshot 2022 report published today. While many of the misconfigurations and vulnerabilities are considered to be of medium severity or less, at least 25% are rated highly or critically severe. ESB-2022.5996 – F5 Products: CVSS (Max): 8.8 BIG-IP and BIG-IQ are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP (CVE-2022-41622) ESB-2022.5982 – Firefox: CVSS (Max): 9.8* Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the contents of the addressbar, bypass security restrictions, cross-site tracing or execute arbitrary code ESB-2022.5843 – Intel DCM: CVSS (Max): 8.8 A potential security vulnerability in the Intel Data Center Manager (DCM) software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability ESB-2022.6008 – asterisk: CVSS (Max): 9.8 Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 11th November 2022

Greetings, AUSCERT is seeking a new team member in our security systems admin and development area to lead engineering efforts and coordinate projects across our Analyst Team. If you're interested in security automation, infrastructure-as-a-service and cybersecurity-specific open source projects such as MISP, apply now – applications close this Sunday! AUSCERT’s Senior Manager, Mike Holm delivered a presentation on how to digest MISP data and draw meaningful conclusions from it during the 2022 AHECS Cybersecurity Summit held on the 7th-9th November in Canberra. The AHECS Cybersecurity Summit is a conference developed by the sector with a focus on the Higher Education and Research Cybersecurity, Identity Management and Privacy Community. In Cyber security news this week, criminals released files on a dark web forum that are believed to contain stolen Medibank customer data. Australian Federal Police announced the expansion of Operation Guardian to protect Medibank Private customers whose personal data was unlawfully released to the internet. Operation Guardian was set up in September this year to deliver specialised protection to current and former Optus customers from identity crime and financial fraud following the Optus cybercrime incident. AUSCERT advises its members who are impacted by the recent data breaches to be alert for any phishing scams via email, texts, voice calls or post and verify any communications received to ensure that they are from a legitimate source. In other news this week, our celestial neighbour glowed a spectacular red colour as the last total lunar eclipse for three years illuminated the sky on Tuesday night. While most parts of Australia had a clear view of the total lunar eclipse, the stargazers from our neighbours across the ditch had the most spectacular full show. The next total lunar eclipse is expected to grace our skies on March 14, 2025. Last but not least, AUSCERT acknowledges Remembrance Day and remembers the armed forces members who gave their lives in the line of duty to protect the nation. Have a good weekend! Experts Find URLScan Security Scanner Inadvertently Leaks Sensitive URLs and Data Date: 2022-11-07 Author: The Hacker News Security researchers are warning of "a trove of sensitive information" leaking through urlscan.io, a website scanner for suspicious and malicious URLs. Nation-State Hacker Attacks on Critical Infrastructure Soar: Microsoft Date: 2022-11-07 Author: Security Week According to Microsoft’s 2022 Digital Defense Report, nation-state hacker attacks on critical infrastructure have soared, largely due to Russian cyber operations targeting Ukraine and its allies. Between June 2020 and June 2021, 20% of all nation-state attacks observed by Microsoft were aimed at critical infrastructure. That percentage increased to 40% in the period between July 2021 and June 2022. Microsoft November 2022 Patch Tuesday fixes 6 exploited zero-days, 68 flaws Date: 2022-11-08 Author: Bleeping Computer Today is Microsoft's November 2022 Patch Tuesday, and with it comes fixes for six actively exploited Windows vulnerabilities and a total of 68 flaws. Eleven of the 68 vulnerabilities fixed in today's update are classified as 'Critical' as they allow privilege elevation, spoofing, or remote code execution, one of the most severe types of vulnerabilities. ‘Cyberspace has become a battleground,’ warns Australian Cyber Security Centre Date: 2022-11-04 Author: The Record The Australian Cyber Security Centre received over 76,000 cybercrime reports during the last financial year — an increase of nearly 13% — and warned in its latest annual report that “cyberspace has become a battleground.” The agency also warned that the regional dynamics in the Indo-Pacific were “increasing the risk of crisis” and cautioned that “cyber operations are likely to be used by states to challenge the sovereignty of others.” Several Cyber Attacks Observed Leveraging IPFS Decentralized Network Date: 2022-11-09 Author: The Hacker News A number of phishing campaigns are leveraging the decentralized Interplanetary Filesystem (IPFS) network to host malware, phishing kit infrastructure, and facilitate other attacks. "Multiple malware families are currently being hosted within IPFS and retrieved during the initial stages of malware attacks," Cisco Talos researcher Edmund Brumaghin said in an analysis shared with The Hacker News. The research mirrors similar findings from Trustwave SpiderLabs in July 2022, which found more than 3,000 emails containing IPFS phishing URLs as an attack vector, calling IPFS the new "hotbed" for hosting phishing sites. Medibank hackers target high-profile drug and mental health patients as AFP steps up action Date: 2022-11-09 Author: ABC News Medibank customers remain in the dark about whether any of their personal information is among that leaked onto the dark web by hackers overnight. It appears the cybercriminals have published what they have termed "naughty" and "nice" lists of prominent people amongst the leaked data. ASB-2022.0199.5 – UPDATE Medibank Cyber Security Incident : Medibank released further information on the Medibank cyber security incident and confirmed that customer data has been released on a dark web forum. ESB-2022.5782 – Nessus : CVSS (Max): 9.8 Tenable released Nessus Version 8.15.7 to address multiple vulnerabilities in its third-party components. ASB-2022.0234 – ALERT Exchange Server: CVSS (Max): 8.8 Microsoft's most recent security patch update includes a fix to resolves 4 vulnerabilities across Microsoft Exchange Server. ASB-2022.0233 – ALERT Windows 7 and Windows Server 2008: CVSS (Max): 8.8* Microsoft has released its patch update for the month of November 2022 which resolves 24 vulnerabilities in Windows 7 and Windows Server 2008. ASB-2022.0231 – ALERT Windows and Windows Server: CVSS (Max): 8.8* Microsoft released fixes for 40 vulnerabilities across Windows 8.1, 10, 11 and Windows Server 2012, 2016, 2019, 2022. ESB-2022.5792.2 – UPDATE iOS and iPadOS: CVSS (Max): 8.2 Apple released iOS 16.1.1 and iPadOS 16.1.1 to address issues in libxml which if exploited could result in arbitrary code execution or denial of service. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 4th of November 2022

Greetings, This week saw trick-or-treaters and people of all ages flock to the streets in ‘spooky’ costumes in celebration of Halloween. The history of trick-or-treating goes back to Scotland and Ireland, where the tradition began as people would go door to door staging performances that were rewarded with food and sweets. Speaking of candy, today is the National Candy Day! Of course, this is mostly celebrated in the US, but why not make it into an excuse to dig into the leftover Halloween treats? Whether it is chewy, gummy, hard, fruit-flavoured or the ones that melt in your mouth, candy has always been a source of universal happiness. On a more serious topic, The OpenSSL Project released OpenSSL 3.0.7 to address two high-severity security flaws in its cryptographic library amid a big storm of hype in the Cyber Security world. These flaws were initially listed as “critical” but were downgraded to “high” following additional testing. The vulnerabilities affect OpenSSL versions 3.0.0 to 3.0.6. AUSCERT strongly recommends the deployment of OpenSSL 3.0.7 as soon as possible to impacted applications and servers to avoid potential Denial of Service or Remote Code Execution attacks. In other news this week, Australia took part in the Counter Ransomware Initiative (CRI) Summit hosted by the White House on 31 October to 1 November 2022. The participating governments released a set of planned actions including the establishment of the Voluntary International Counter Ransomware Task Force, led by Australia that will encourage threat information sharing and better coordination of the international actions aimed at tracking ransomware criminals' financial activities. Last but not least, AUSCERT would like to remind everyone to be mindful of current threats and vulnerabilities, with the recent spate of data breaches and ransomware attacks targeting Australian organisations. Have a good weekend! … Microsoft releases out-of-band updates to fix OneDrive crashes Date: 2022-10-29 Author: Bleeping Computer Microsoft has released out-of-band updates to address a known issue causing OneDrive and OneDrive for Business to crash after installing recent Windows 10 updates. The issue occurs when signing out or unlinking OneDrive accounts or sites and folders from Microsoft Teams and SharePoint. "After installing KB5018410 or later updates, OneDrive might unexpectedly close," Redmond explained in a Windows health dashboard update on Friday. OpenSSL fixes two high severity vulnerabilities Date: 2022-11-01 Author: Bleeping Computer The OpenSSL Project has patched two high-severity security flaws in its open-source cryptographic library used to encrypt communication channels and HTTPS connections. The vulnerabilities (CVE-2022-3602 and CVE-2022-3786) affect OpenSSL version 3.0.0 and later and have been addressed in OpenSSL 3.0.7. CVE-2022-3602 is an arbitrary 4-byte stack buffer overflow that could trigger crashes or lead to remote code execution (RCE), while CVE-2022-3786 can be exploited by attackers via malicious email addresses to trigger a denial of service state via a buffer overflow. Australian Defence Department caught up in ransomware attack Date: 2022-10-31 Author: ABC News A communications platform used by military personnel and Defence Department public servants has been hit by a ransomware attack. Hackers have targeted the ForceNet service, which is run by an external ICT provider, but Defence has been told no data of current or former personnel appears to have been compromised. Dropbox discloses breach after hacker stole 130 GitHub repositories Date: 2022-11-01 Author: Bleeping Computer Dropbox disclosed a security breach after threat actors stole 130 code repositories after gaining access to one of its GitHub accounts using employee credentials stolen in a phishing attack. The company discovered the attackers breached the account on October 14 when GitHub notified it of suspicious activity that started one day before the alert was sent. "To date, our investigation has found that the code accessed by this threat actor contained some credentials—primarily, API keys—used by Dropbox developers," Dropbox revealed on Tuesday. Govt counter-ransomware taskforce in works Date: 2022-11-02 Author: FST Media Minister for Home Affairs and Cyber Security, Clare O’Neil, said the taskforce will be convened by the Department of Home Affairs Cyber and Critical Technology Coordination Centre after members of the international initiative agreed to establish a unit at the Counter Ransomware Summit in Washington earlier this week. “The cyber incident involving Medibank Private is a blunt reminder that we need a globally focused capability to combat cyber threats, including ransomware,” Minister O’Neil said. ESB-2022.5595 – Red Hat Single Sign-On 7.6.1 security update on RHEL 9 Multiple security fixes introduced with the latest version of Red Hat Single Sign On address remote code execution, denial of service and XSS vulnerabilities. ASB-2022.0229.2 – OpenSSL Critical Patch Update for 3.0.x It was discovered that OpenSSL incorrectly handled certain X.509 Email Addresses. If a certificate authority were tricked into signing a specially-crafted certificate, a remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. ESB-2022.5303.2 – APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16 Multiple security updates were released by Apple for iOS 16.1 and IPadOS 16 that addressed vulnerabilities relating to arbitrary code execution, app privilege levels and disclosure of user information. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 28th October 2022

Greetings, Episode 16 of our podcast has landed and features a chat between Anthony Caruana and Alex Tilley of Secureworks about understanding and combatting cyberattacks – timely given the recent spate of Australians impacted by several large-scale data breaches. Later, the AUSCERT team discuss the intangible nature of cyber threats and the need for greater awareness of their relevance and potential impact. To improve understanding of what can be done in this regard, the discussion then focuses on education and learning, including AUSCERT’s training courses. The first of November of each year sees the culturally significant celebration Dia de los Muertos, also known as the Day of the Dead, across Mexico. Unlike Halloween, Dia de los Muertos isn’t about scaring or being frightened but celebrates the lives of loved ones who have passed away. Day of the Dead combines the ancient Aztec custom of celebrating ancestors with All Souls’ Day, a holiday that Spanish invaders brought to Mexico starting in the early 1500s and has become a joyful time that helps people remember the deceased and celebrate their memory. This time of year also typically sees shades of purple dominate streetscapes across Australia with the Jacaranda trees flowering. The captivating and vibrant Jacaranda is an iconic tree in Australia but is native to Central and South America. Here at The University of Queensland, they’re even part of local lore, signifying the end-of-year exams and are celebrated with the BLOOM Festival. There’s a lot to see, including interactive exhibits, live music, pop-up picnics and indigenous foods. Gov invokes emergency coordination as Medibank breach worsens Date: 2022-10-26 Author: IT News The government has invoked a Covid-era response mechanism, bringing together federal, state and territory agencies to coordinate on the worsening Medibank data breach. Minister for cyber security Clare O’Neil said the national coordination mechanism (NCM) was activated on Saturday. The activation came as Medibank announced that the attackers who breached its ahm and international student systems had provided a file which demonstrated compromise of customer records under its main brand as well. Security experts targeted with malicious CVE PoC exploits on GitHub Date: 2022-10-24 Author: Security Affairs A team of researchers at the Leiden Institute of Advanced Computer Science (Soufian El Yadmani, Robin The, Olga Gadyatskaya) discovered thousands of repositories on GitHub that offer fake proof-of-concept (PoC) exploits for multiple vulnerabilities. The experts analyzed PoCs shared on GitHub for known vulnerabilities discovered in 2017-2021, some of these repositories were used by threat actors to spread malware. The experts pointed out that public code repositories do not provide any guarantees that any given PoC comes from a trustworthy source. Prepare Now for Critical Flaw in OpenSSL, Security Experts Warn Date: 2022-10-28 Author: Dark Reading [Refer AUSCERT Bulletin ASB-2022.0229 ] Organizations have five days to prepare for what the OpenSSL Project on Oct. 26 described as a “critical” vulnerability in versions 3.0 and above of the nearly ubiquitously used cryptographic library for encrypting communications on the Internet. On Tuesday, Nov. 1, the project will release a new version of OpenSSL (version 3.0.7) that will patch an as-yet-undisclosed flaw in current versions of the technology. The characteristics of the vulnerability and ease with which it can be exploited will determine the speed with which organizations will need to address the issue. Why Retail Stores Are More Vulnerable Than Ever to Cybercrime Date: 2022-10-27 Author: Dark Reading When we think about cybercrime and retail it is natural to focus on websites being targeted with attacks. Indeed, there has been a shocking rise in the number of cyberattacks perpetrated against online retailers in the past year. Dakota Murphey explains why store owners and security managers need to also protect their physical locations from the cyber threat, too, however. Figures from SonicWall’s Biannual Report revealed that e-commerce and online retail businesses saw a 264% surge in the past 12 months in ransomware attacks alone. These kinds of statistics are extremely worrying for retail businesses, so it is unsurprising that websites and digital security are at the forefront of retailers’ minds. However, for those retailers that have a physical store as well as an online presence, there might be an assumption that the cybersecurity in-store doesn’t need to be considered as a top priority. Well, doing so could be a big mistake. Third quarter of 2022 reveals increase in cyberattacks and unexpected developments in global trends Date: 2022-10-26 Author: Check Point Highlights: Global attacks increased by 28%in the third quarter of 2022 compared to same period in 2021. The average weekly attacks per organization worldwide reached over 1,130 The most attacked industry in the third quarter of the year was the Education/Research sector, with an average of 2,148 attacks per organization every week, an increase of 18% compared to third quarter of 2021 The Healthcare sector was the most targeted industry for ransomware during the third quarter of 2022, with one in 42 organizations impacted by ransomware, a 5% increase YoY Australian Clinical Labs says patient data stolen in ransomware attack Date: 2022-10-27 Author: Bleeping Computer Australian Clinical Labs (ACL) has disclosed a February 2022 data breach that impacted its Medlab Pathology business, exposing the medical records and other sensitive information of 223,000 people. ESB-2022.5278 – Apache Commons Text : CVSS (Max): 9.8 Apache Software Foundation has reported a vulnerability in Apache Commons Text and recommends the users to upgrade Commons Text to 1.10.0. ESB-2022.5300 – ALERT macOS Ventura: CVSS (Max): 9.8* Apple has released macOS Ventura 13 which fixes a number of issues across a range of products. ASB-2022.0199.4 – UPDATE Medibank Cyber Security Incident Medibank announced a further development in the Medibank data breach incident. AUSCERT continues to keep its members updated as further information is released. ASB-2022.0228 – Energy Australia Data Breach Energy Australia announced a cyber incident which involved unauthorised access to their online platform. AUSCERT is aware of the incident and will share further information with members as they become available. ASB-2022.0229 – OpenSSL OpenSSL version 3.0.7 is scheduled for Tuesday, 1 November 2022 and includes a patch for a critical vulnerability. AUSCERT strongly recommends the administrators to apply the patch when it is released. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for October 21st 2022

Greetings, AUSCERT has been receiving reports of various Request For Quote (RFQ) scams spoofing Australian Universities and targeting several small vendors via the spoofed domain. Our recent blog post delves into the current methods being used to help identify potential scams and recommendations on what can be done, should you be the victim of such a scam. AUSCERT aims to inform and educate how and when we can, including through our training sessions, aimed at anyone that looks after their organisation’s cyber security. We have three courses currently available for the remainder of 2022, as per the below: Intro to Cyber for IT Professionals | October 24 and 25 (it’s not too late to register!) Cyber Security Risk Management | October 31 and November 1 Incident Response Planning | December 6 and 7 All courses are delivered online in two half-day sessions from 9 am to 12:30 pm each day. For more information on each course or, to book online, visit our Education page. Diwali, also known as the Festival of lights or Deepavali, will commence on Monday, October 24 and is a five-day-long celebration. It is revered as a day to light the lamp of power, knowledge, and virtues within each of us and signifies the victory of good over evil. Watch out for the celebrations with entertainers, fireworks displays, dancing performances, music, henna and more throughout the city in many shopping centres, King George Square and Indian restaurants. You can learn more about this cultural festival, including a feast consisting of special dishes, by clicking here. Speaking of food, today is International Day of the Nacho. Yes, there is an official day to indulge and overeat the tasty corn chip or tortilla-based treat, layered with guacamole, beans, minced beef and cheese! Invented in 1943, nachos have been a go-to dish for many with unknown and seemingly unlimited variations seen in their near 80-year history. To see how others eat their nachos, or, to learn more about this Tex-Mex culinary delight, click here. Adobe patches critical Magento XSS that puts sites at takeover risk Date: 2022-10-14 Author: The Daily Swig A super-critical vulnerability in Adobe Magento could allow attackers to fully compromise e-commerce platforms, according to the security researcher who unearthed the bug. Adobe has urged users to update their systems to protect their websites from abuse of the flaw, which has been assigned the maximum possible severity (CVSS) score of 10. Woolworths says 2.2m MyDeal customers’ data hacked Date: 2022-10-15 Author: Financial Review [Refer AUSCERT Bulletin: ASB-2022.0200.2] In the third major corporate security breach in as many weeks, Woolworths is scrambling to contact 2.2 million customers of its MyDeal online marketplace arm whose data has been accessed by an unauthorised user using “compromised” credentials, the supermarkets giant says. The hack follows telecoms group Optus in owning up to data breaches affecting millions of consumers. Health insurer Medibank Private also disclosed a data breach but said it had no evidence of any customer data being accessed, although it was still investigating the hack. Apache Commons Text RCE flaw — Keep calm and patch away Date: 2022-10-19 Author: Bleeping Computer [Refer AUSCERT Bulletin: ESB-2022.5278] A remote code execution flaw in the open-source Apache Commons Text library has some people worried that it could turn into the next Log4Shell. However, most cybersecurity researchers say it is nowhere near as concerning. Apache Commons Text is a popular open-source Java library with an “interpolation system” that allows developers to modify, decode, generate, and escape strings based on inputted string lookups. For example, passing the string lookup ${base64Decoder:SGVsbG9Xb3JsZCE=} to the interpolation system would cause the library to convert it to its base64 decoded value of ‘HelloWorld!’. Microsoft Office 365 email encryption could expose message content Date: 2022-10-14 Author: Bleeping Computer Security researchers at WithSecure, previously F-Secure Business, found that it is possible to partially or fully infer the contents of encrypted messages sent through Microsoft Office 365 due to the use of a weak block cipher mode of operation. Organizations use Office 365 Message Encryption to send or receive emails, both external and internal, to ensure confidentiality of the content from destination to source. However, the feature encrypts the data using the Electronic Code Book (ECB) mode, which allows inferring the plaintext message under certain conditions. Police tricked a ransomware gang into handing over its decryption keys. Here’s how they did it Date: 2022-10-17 Author: ZDNET Police tricked a ransomware gang into handing over decryption keys, providing victims with the ability to unlock their encrypted data for free. Working alongside cybersecurity company Responders.NU, the Dutch National Police obtained 150 decryption keys from ransomware group Deadbolt. With the decryption keys now in the hands of law enforcement, some victims of Deadbolt ransomware attacks can retrieve encrypted files and servers without the need to pay cyber-criminal extortionists. Medibank’s alleged attackers threaten data release, extortion Date: 2022-10-20 Author: iTnews [Refer AUSCERT Bulletin: ASB-2022.0199.3] Medibank has entered a trading halt after being contacted by a group claiming to have copied customer data. The Sydney Morning Herald yesterday reported it had heard from the alleged attackers, who were threatening to release patient data from a “200 gigabyte” haul. The threats included selling the data, or releasing information like diagnoses about the most prominent people found in the database. In an market disclosure late yesterday, the health insurer said it was “a new development” that will “cause concerns for customers”. ESB-2022.5278 – Apache Commons Text : CVSS (Max): 9.8 Apache Software Foundation has reported a critical vulnerability in Apache Common Text and recommends its users to upgrade to version 1.10.0. ASB-2022.0199.3 – UPDATE Medibank Cyber Security Incident Medibank has reported that the alleged hacking group has provided a sample of records for 100 policies. Australian Federal Police is investigating the issue as a crime. ASB-2022.0200.2 – UPDATE MyDeal Data Breach The hacker involved in the MyDeal data breach has reportedly released samples of the stolen data to a hacking forum. MyDeal customers are encouraged to reset their passwords. ASB-2022.0220 – Oracle PeopleSoft: CVSS (Max): 8.1* Multiple vulnerabilities have been identified in Oracle PeopleSoft. The vendor has released a critical patch update which contains 8 new security patches. ASB-2022.0201 – Oracle Commerce Platform: CVSS (Max): 9.8 The critical patch update for October 2022 contains 3 new security patches for Oracle Commerce. ESB-2022.5232 – Jenkins Plugins: CVSS (Max): 8.8 Jenkins Security Advisory for October 2022 announces vulnerabilities in Jenkins plugins. Security updates have been released for most of the plugins. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for October 14th 2022

Greetings, As Marie Antoinette is said to have proclaimed, “Let them eat cake!”, for today, October 14 is National Dessert Day. Given the need to celebrate such an auspicious occasion, it’s official that today is the day when calories don’t count. As such, we implore everyone to consider their preferred sugary, tasty treat to indulge in and if you’re stuck for ideas, the following site may be able to assist. Simply click HERE. The Optus saga moves forward with ongoing commentary made about the situation which only increases as more details and issues arise, seemingly every day. A recent article in the Financial Review posits that “Companies and individuals don’t rise to the occasion. They fall to their level of preparedness.” The comment comes as banks, such as the CBA, experience an increase in the number of calls received each day from concerned customers about their financial security. The article also states that whilst risks can never be completely removed, those responsible should be aware of the risks and plan for how to respond should an incident occur. We’d like to remind those that wish to share their thoughts, experience, and insights into the dynamic and ever-changing landscape of cyber security that the annual BDO and AUSCERT Cyber Security Survey is now open! The annual BDO and AUSCERT cyber security survey identifies the current cyber security trends, issues and threats facing organisations across Australia and New Zealand. Zimbra remote code execution vulnerability actively exploited in the wild Date: 2022-10-10 Author: The Daily Swig [AUSCERT has been in touch with the affected members] A zero-day remote code execution (RCE) vulnerability in Zimbra is being actively exploited in the wild. The bug was assigned the tracker CVE-2022-41352 in late September. Issued a CVSS severity score of 9.8, the critical issue can be exploited to plant a shell in the software’s root directly, achieving RCE and enabling attackers to wreak havoc on a vulnerable system. Zimbra, once known as the Zimbra Collaboration Suite (ZCS), is an open source email suite. The software is relied upon by millions of users and is designed for managing enterprise and SMB email and collaboration tools. Fortinet says critical auth bypass bug is exploited in attacks Date: 2022-10-10 Author: Bleeping Computer [See also ASB-2022.0192.2] Fortinet has confirmed today that a critical authentication bypass security vulnerability patched last week is being exploited in the wild. The security flaw (CVE-2022-40684) is an auth bypass on the administrative interface that enables remote threat actors to log into FortiGate firewalls, FortiProxy web proxies, and FortiSwitch Manager (FSWM) on-premise management instances. “An authentication bypass using an alternate path or channel vulnerability [CWE-288] in FortiOS, FortiProxy and FortiSwitchManager may allow an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests,” Fortinet said in an advisory issued today. Medibank takes systems offline after ‘cyber incident’ Date: 2022-10-13 Author: iTnews [See also ASB-2022.0199 ] Investigates extent of unauthorised access. Medibank has taken two customer-facing systems offline “to reduce the likelihood of damage to systems or data loss” stemming from a cyber security incident. The insurer said that policy management systems covering its ahm brand as well as international students are now offline, and would remain that way “for most of the day”. It did not detail what had exactly occurred, aside from the detection of “unusual activity on its network.” Optus data breach response ‘cracking’ as cyber support charity fields 15,000 queries and counting Date: None Author: ABC News A national identity and cyber support charity say they are enduring the “toughest” period in the organisation’s history following the Optus data breach. IDCARE fielded a months’ worth of calls in just three days following the incident, and in the past three weeks has dealt with more than 15,000 interactions with no signs of slowing down. Darkweb market BidenCash gives away 1.2 million credit cards for free Date: 2022-10-09 Author: Bleeping Computer [AUSCERT has been in touch with the affected members] A dark web carding market named ‘BidenCash’ has released a massive dump of 1,221,551 credit cards to promote their marketplace, allowing anyone to download them for free to conduct financial fraud. Carding is the trafficking and use of credit cards stolen through point-of-sale malware, magecart attacks on websites, or information-stealing malware. BidenCash is a stolen cards marketplace launched in June 2022, leaking a few thousand cards as a promotional move. Indicators of Behavior and the Diminishing Value of IOCs Date: 2022-10-12 Author: Cyber reason How secure is your organization if you can only stop attacks that have already been detected in other environments based on Indicators of Compromise (IOCs)? Secure enough, if those were the only attacks you needed to be concerned with. But what about targeted attacks with bespoke tactics, techniques, and procedures (TTPs) that have never been documented because they were designed only to be used against your organization? In today’s threat landscape that’s what’s happening: zero-day exploits, never-before-seen malware strains, and advanced techniques developed specifically for high-value targets are plaguing security teams. ASB-2022.0199 – Medibank Cyber Security Incident AUSCERT shares information on a security incident targeting Medibank. AUSCERT will continue to share further information as they become available. ASB-2022.0192.2 – UPDATED ALERT FortiOS,FortiProxy and FortiSwitchManager: CVSS (Max): 9.6 Fortinet reported a critical vulnerability in 3 of its products which may allow an unauthenticated attacker to perform operations on the compromised devices. Fortinet released important mitigation information as well as security updates. ESB-2022.5034 – wordpress: CVSS (Max): 9.8 Several security vulnerabilities were discovered in WordPress for which a security patch has been released. ASB-2022.0195 – ALERT Azure: CVSS (Max): 10.0 Microsoft’s monthly security patch update for October included an update to resolves 3 vulnerabilities in Azure. ASB-2022.0193 – ALERT Windows and Windows Server: CVSS (Max): 8.8 Microsoft’s most recent patch update fixes 68 vulnerabilities in Windows and Widows Server. ESB-2022.5091 – Google Chrome: CVSS (Max): None Google announced updates to the Google Chrome Stable channel and Extended stable channel. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week In Review for October 7th 2022

Greetings, It’s Cyber Security Awareness Month in October which, given the recent breadth and severity of data leaks seen in Australia, is an opportune reminder to be mindful of current threats and vulnerabilities. Now in its seventh year, the BDO and AUSCERT Cyber Security Survey allows organizations to benchmark their approach to cyber risk. The information provided will then provide the chance to assess and optimise organizational cyber security. There’s also the chance to win one of two Apple Airpod Pros so be sure to complete your survey before Friday, November 18! It was announced yesterday that a proposal by the federal government had been made to allow Australian banks temporary access to government identification details by telcos in the wake of the Optus data breach. The move is to assist in preventing fraud, but banks would need to adhere to strict requirements to reduce the risk of further compromise of customer data. This Monday, October 10 will see the next full moon, referred to as the Pink Moon, signifying the arrival of the first spring flowers. Apart from the pink moon, the other October full moon names in the southern hemisphere are Egg Moon, Seed Moon, and Waking Moon whilst in the northern hemisphere, they will experience the Hunter’s Moon. The name derives from a time when the full moon signified the time to start preparing for the coming winter by hunting animals and preserving meat. If you live north of the equator, be sure to learn how you can view one of the year’s most stunning celestial events! Cisco Patches High-Severity Vulnerabilities in Communications, Networking Products Date: 2022-10-06 Author: SECURITY WEEK Cisco announced on Wednesday that it has patched potentially serious vulnerabilities in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. Windows 11 22H2 breaks provisioning with 0x800700b7 errors Date: 2022-10-06 Author: Bleeping Computer Microsoft says the Windows 11 2022 Update is breaking provisioning, leaving Windows 11 enterprise endpoints partially configured and failing to finish installing. Meta sues app dev for stealing over 1 million WhatsApp accounts Date: 2022-10-06 Author: BLEEPING COMPUTER Meta has sued several Chinese companies doing business as HeyMods, Highlight Mobi, and HeyWhatsApp for developing and allegedly using “unofficial” WhatsApp Android apps to steal over one million WhatsApp accounts starting May 2022. Sydney man charged for allegedly trying to scam Optus breach victims – Telco/ISP – iTnews Date: 2022-10-06 Author: ITNEWS A 19-year-old Sydney man has been charged with allegedly trying to blackmail Optus customers whose data was leaked onto the internet as proof of a data breach. Optus ups number of Medicare cards breached – Security Date: 2022-10-07 Author: ITNEWS Optus has revised the number of its customers whose Medicare card numbers were exposed in a recent data breach to 43,000. Microsoft Updates Mitigation for Exchange Server Zero-Days Date: 2022-10-05 Author: Dark Reading [AUSCERT Bulletin: ASB-2022.0191.2] Microsoft today updated its mitigation measures for two recently disclosed and actively exploited zero-day vulnerabilities in its Exchange Server technology after researchers found its initial guidance could be easily bypassed. Microsoft’s original mitigation for the two vulnerabilities — CVE-2022-41040 and CVE-2022-41082 — was to apply a blocking rule to a specific URL path using the URL Rewrite Module on IIS Server. According to the company, adding the string “.*autodiscover\.json.*\@.*Powershell.*” would help block known attack patterns against the vulnerabilities. It’s Telstra’s Turn for a Data Breach, This Time It’s Staff That Are Affected Date: 2022-10-04 Author: Gizmodo The term ‘data breach’ has, in the last few weeks, worked its way into everyday conversation in Australia, thanks mostly to the failings of Optus. But now, details have emerged of another data breach affecting the Aussie telco sector – this time, it’s Telstra and it is employees that are at risk. Brought to our attention first by The Australian, Telstra reportedly sent out a memo to staff over the weekend informing them of the data breach. It has since been confirmed by Telstra, with a spokesman telling Gizmodo Australia that the data breach affecting a third party included “limited” Telstra employee information from 2017. It is understood the third party handled Telstra’s rewards program for staff. ESB-2022.4906 – chromium: CVSS (Max): None Debian has released a new Chromium package version that fixes arbitrary code execution, denial of service or information disclosure. ESB-2022.4967 – nodejs: CVSS (Max): 9.8 Debian has released an update for nodejs that address multiple vulnerabilities. ESB-2022.5007 – LibreOffice: CVSS (Max): 8.8 Ubuntu has released a new package version that fixes several security issues in LibreOffice. ASB-2022.0191.3 – ALERT Microsoft Exchange Server: CVSS (Max): 8.8 Microsoft has made significant updates to its advisory regarding Exchange Server Zero-Day Vulnerabilities which could lead to remote code execution. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week In Review for September 30th 2022

Greetings, The fallout from last week’s Optus data breach has impacted customers across Australia. There has been a flurry of reports and statements advising the varying options available to affected individuals in relation to attaining a replacement Driver’s Licence, many of which have indicated that they will pursue Optus to cover the cost. Earlier today, Optus agreed to pay for the replacement of passports exposed in the leak and, that the Australian Federal Police (AFP) had launched Operation Guardian which would prioritise the protection of the 10,000 records that were revealed last week before the hacker had a change of mind about releasing additional data. Today, September 30, is International Podcast Day, an opportunity to explore seemingly endless genres that anyone can access just about anywhere. There are millions of podcasts available across an array of platforms, including our very own series, Share Today, Save Tomorrow, which features episodes that range in topics including ITOT Convergence, Diversity and Culture in Cyber Security and more! You can download or stream an episode, kick back and enjoy a cup of coffee this Saturday, October 1st, which just so happens to be International Coffee Day. Over three billion cups of coffee are consumed each day across the globe, making it a significant part of many people’s daily routines. This year, members, and partners of the International Coffee Organization (ICO) wish to highlight their commitment to coffee farmers’ prosperity and efforts to reduce the coffee industry’s impact on the environment and mitigate climate change with the vision of an effective Circular Economy. Two Remote Code Execution Vulnerabilities Patched in WhatsApp Date: 2022-09-27 Author: Security Week WhatsApp has patched two serious vulnerabilities that could be exploited for remote code execution. WhatsApp only has three security advisories for 2022, with the first two released in January and February. The latest advisory, released this month, informs customers of two memory-related issues affecting the WhatsApp mobile applications. One of the flaws, tracked as CVE-2022-36934 and rated ‘critical’, is an integer overflow issue that affects WhatsApp for Android prior to 2.22.16.12, Business for Android prior to 2.22.16.12, iOS prior to 2.22.16.12, and Business for iOS prior to 2.22.16.12. Attackers abuse web security flaw in Sophos Firewall Date: 2022-09-26 Author: The Daily Swig A recently resolved vulnerability in Sophos Firewall has been abused by attackers in targeted attacks, the vendor warns. The critical vulnerability (CVE-2022-3236) poses a remote code execution (RCE) risk. Sophos Firewall v19.0 MR1 (19.0.1) and older are potentially vulnerable to the security bug in the User Portal and Webadmin of Sophos Firewall. In a security advisory published on Friday (September 23), Sophos said that it has issued a patch that installs automatically in default installations of its firewall technology. This is just as well given the vulnerability has already featured in attacks in the wild. Hacking group hides backdoor malware inside Windows logo image Date: 2022-09-29 Author: Bleeping Computer Security researchers have discovered a malicious campaign by the ‘Witchetty’ hacking group, which uses steganography to hide a backdoor malware in a Windows logo. New Microsoft Exchange zero-day actively exploited in attacks Date: 2022-09-29 Author: Bleeping Computer Threat actors are exploiting yet-to-be-disclosed Microsoft Exchange zero-day bugs allowing for remote code execution. Hackers now sharing cracked Brute Ratel post-exploitation kit online Date: 2022-09-28 Author: Bleeping Computer The Brute Ratel post-exploitation toolkit has been cracked and is now being shared for free across Russian-speaking and English-speaking hacking communities. For those unfamiliar with Brute Ratel C4 (BRC4), it is a post-exploitation toolkit created by Chetan Nayak, an ex-red teamer at Mandiant and CrowdStrike. Red teamers are cybersecurity professionals whose job is to try and breach a corporate network to learn its flaws, while those on the blue team attempt to defend against these attacks. Russia Planning Cyberattacks on Ukraine’s Energy Grid Date: 2022-09-27 Author: Dark Reading As protests against military conscription rage inside Russia, the country is planning to continue its offensive into Ukraine with cyberattacks on critical infrastructure. The Odessa Journal reported Ukrainian military intelligence has learned the first cyberattacks will soon be launched against the Ukrainian energy sector, informed by previous Russian cyberattacks on the country’s electricity infrastructure in 2015 and 2016. After energy supply operations are crippled by cyberattacks, the Russian military plans to ramp up missile strikes on those facilities to shut down the electrical service throughout the war-battered country. Microsoft finally adds a Task Manager link to the Windows 11 taskbar Date: 2022-09-29 Author: Bleeping Computer Microsoft has finally re-added a link to the Task Manager to the taskbar’s contextual menu in the latest Windows 11 Insider preview build. ASB-2022.0190.3 – Optus Data Breach Following a cyberattack, Optus has advised its customers to be vigilant about any suspicious activities. ESB-2022.4826 – Cisco IOS XE: CVSS (Max): 5.5 Cisco has released software updates that address a vulnerability in the web UI feature of Cisco IOS XE software. ESB-2022.4848 – chromium: CVSS (Max): 7.8 Debian has released an upgrade package for Chromium that addresses a vulnerability which allows an attacker to execute arbitrary code denial of service or information disclosure. ASB-2022.0191 – ALERT Microsoft Exchange Server News is currently emerging regarding possible Microsoft Exchange Server Zero-Day Vulnerabilities which could lead to remote code execution. ESB-2022.4884 – Google Chrome: CVSS (Max): None Google has released a new Chrome update for Windows, Mac and Linux. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week In Review for September 23rd 2022

Greetings, The cyber attack on Optus on Thursday (September 22) is said to impact current and former customers with information including names, birth dates, email addresses and phone numbers said to have been disclosed. It remains unknown how many of the 9.7 million Optus customers have been compromised with Scamwatch issuing an alert, warning customers to be vigilant to mitigate any potential harm. An unknown time factor is associated with the attack as data can be retained indefinitely. Of particular focus is individuals’ financial accounts with suggestions on what to do to help protect your personal information provided by the ACCC division. What may be causing others in the community a bit of undue stress is the school holidays that are underway or just getting started. With the addition of a public holiday, potentially utilised to create a long weekend, along with some less-than-ideal weather, you may be looking for something to fill your time or, distract from the kids playing or warring with one another. If so, AUSCERT has something to help. In fact, we have two ‘somethings’ for you to choose from! Our YouTube channel has over 50 videos from this year’s conference that cover a diverse range of topics that will inform, inspire and illicit reactions of varying scope. The other option available to you is fifteen episodes of our podcast, Share Today, Save Tomorrow. You can select from several subjects that provide insights and understanding as well as an understanding of potential challenges. EZVIZ video cameras can be accessed remotely – Security Date: 2022-09-19 Author: IT News Full device takeover possible. Researchers at security vendor Bitdefender have found a series of serious vulnerabilities which could be used to remotely control EZVIZ networked cameras without authentication, in order to download and decrypt images. Bitdefender was able to create an attack chain of four different bugs to take over the EZVIZ cameras, exploiting a stack buffer overflow, and vulnerable application programming interface endpoints. Google, Microsoft can get your passwords via web browser’s spellcheck Date: 2022-09-17 Author: Bleeping Computer Extended spellcheck features in Google Chrome and Microsoft Edge web browsers transmit form data, including personally identifiable information (PII) and in some cases, passwords, to Google and Microsoft respectively. While this may be a known and intended feature of these web browsers, it does raise concerns about what happens to the data after transmission and how safe the practice might be, particularly when it comes to password fields. Australian business owners urged to shorten web addresses to avoid cybercrime attack Date: 2022-09-17 Author: ABC news Business owners across Australia are being told to update their domain names or risk being targeted by cybercriminals. New rules are being introduced to allow Australian businesses, organisations and individuals to shorten their web address to a simpler .au domain name instead of .com.au, .net.au, .or .org.au. For example, www.abc.net.au could become www.abc.au, or www.books.com.au could be shortened to www.books.au. Microsoft 365 phishing attacks impersonate U.S. govt agencies Date: 2022-09-19 Author: Bleeping Computer An ongoing phishing campaign targeting U.S. government contractors has expanded its operation to push higher-quality lures and better-crafted documents. The lure in these phishing emails is a request for bids for lucrative government projects, taking them to phishing pages that are clones of legitimate federal agency portals. This is the same operation that INKY reported about in January 2022, with the threat actors using attached PDFs with instructions on going through the bidding process for the U.S. Department of Labor projects. ESB-2022.4669 – Nessus Network Monitor: CVSS (Max): 9.8 Tenable has released Nessus Network Monitor 6.1.0 to fix multiple third-party vulnerabilities in Nessus Network Monitor. ESB-2022.4662 – Hitachi Energy AFF660/665 Series: CVSS (Max): 9.8 A vulnerability in Hitachi Energy AFF660/665, an industrial firewall could overflow a buffer on the device and fully compromise it. Hitachi Energy recommends its users to follow the security practices and firewall configurations to help protect from outside attacks. ESB-2022.4601 – OpenShift Virtualization: CVSS (Max): 9.8 Red Hat has released an update to OpenShift Virtualization which fixes several bugs and add enhancements. ESB-2022.4611 – Google Chrome: CVSS (Max): None Google has updated its stable channel to 105.0.5195.125 for Mac and Linux. This update includes 11 security fixes. ESB-2022.4655 – SUSE Manager Server: CVSS (Max): 9.8 A security update that solves four vulnerabilities in SUSE manager server has been released. ESB-2022.4634 – connman: CVSS (Max): 9.8 Debian recommends that Connman, a network manager for embedded devices be updated to the latest version to fix a few vulnerabilities, which if exploited could result in denial of service or the execution of arbitrary code. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for September 16th 2022

Greetings, Members of the AUSCERT team recently ventured south from HQ in Brisbane to participate in the long-awaited conference, BSides Melbourne. With travelling returning to pre-COVID normality, our crew were excited at the opportunity to mingle with members of the industry and gain insights and hear of experiences from a wonderful collection of presenters. You can read about the highlights and experiences from one of our team in a recent blog, My Time on the BSide. With school holidays on the horizon, we wish all of those about to embark on travel all the best. Be it heading to the airport or enduring road trips of seemingly ceaseless requests to stop or cries of, “Are we there yet?”, travel safe and may the odds be ever in your favour. There are still a few spots remaining in our first online information gathering session on how you and your organisation use Cyber Threat Intelligence (CTI). The short (1 hour) information gathering sessions via video conference so we can pick your brain about CTI with the first session next Tuesday, September 20 from 9 am until 10 am. To learn more or, register your interest, please click here. On a greener note, in parts of the world, September 16 is National Guacamole Day. Yes, the avocado-based dip, condiment, and salad ingredient is being celebrated today. The tasty green blend known as Guacamole (or “guac”) is said to date back to the Aztecs and is today, synonymous with Mexican cuisine. Traditionally served with tortilla chips, guacamole also goes well with corn chips, carrot sticks or even on its own., With the price of avocados dropping significantly recently, now is the time to go green with guacamole! We’ve found a recipe or 203 for you to peruse and use – enjoy! Zero-day in WPGateway WordPress plugin actively exploited in attacks Date: 2022-09-13 Author: Bleeping Computer [See also ESB-2022.3966] The Wordfence Threat Intelligence team warned today that WordPress sites are actively targeted with exploits targeting a zero-day vulnerability in the WPGateway premium plugin. WPGateway is a WordPress plugin that allows admins to simplify various tasks, including setting up and backing up sites and managing themes and plugins from a central dashboard. This critical privilege escalation security flaw (CVE-2022-3180) enables unauthenticated attackers to add a rogue user with admin privileges to completely take over sites running the vulnerable WordPress plugin. Ransomware gangs switching to new intermittent encryption tactic Date: 2022-09-10 Author: Bleeping Computer A growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims’ systems faster while reducing the chances of being detected and stopped. This tactic is called intermittent encryption, and it consists of encrypting only parts of the targeted files’ content, which would still render the data unrecoverable without using a valid decryptor+key. For example, by skipping every other 16 bytes of a file, the encryption process takes almost half of the time required for full encryption but still locks the contents for good. Uber Says It’s Investigating a Potential Breach of Its Computer Systems Date: 2022-09-16 Author: The Hacker News Ride hailing giant Uber disclosed Thursday it’s responding to a cybersecurity incident involving a breach of its network and that it’s in touch with law enforcement authorities. The New York Times first reported the incident. The company pointed to its tweeted statement when asked for comment on the matter. Death of Queen Elizabeth II exploited to steal Microsoft credentials Date: 2022-09-14 Author: Bleeping Computer Threat actors are exploiting the death of Queen Elizabeth II in phishing attacks to lure their targets to malicious sites designed to steal their Microsoft account credentials. Besides Microsoft account details, the attackers also attempt to steal their victims’ multi-factor authentication (MFA) codes to take over their accounts. “Messages purported to be from Microsoft and invited recipients to an ‘artificial technology hub’ in her honor,” Proofpoint’s Threat Insight team revealed today. Rampant ransomware pushes cyber security premium up by 80% Date: 2022-09-12 Author: Cyber Security Connect Global insurance broker Marsh has identified that the cost of taking out cyber cover had doubled on average every year for the past three years, which has contributed to the sharp rise in premiums. Backed by data from another broker, Honan Group, the 80 per cent rise in premiums in the past 12 months has been determined following a 20 per cent increase in the cost of cover in each of the previous two years. According to Craig Claughton, a senior executive at Marsh, “cyber has become the new D&O”, referring to sharp rises in directors’ and officers’ insurance premiums since 2018. ASB-2022.0186 – ALERT Microsoft Windows: CVSS (Max): 9.8* Microsoft Patch Tuesday for September includes patches for various vulnerabilities affecting Windows ESB-2022.4508 – ALERT macOS Big Sur: CVSS (Max): 7.8* Apple released updates to Big Sur addressing multiple vulnerabilities out of which CVE-2022-32917 may have been actively exploited ESB-2022.4611 – Google Chrome: CVSS (Max): None A stable channel for Google Chrome has been updated to address multiple vulnerabilities ESB-2022.4555 – Red Hat Advanced Cluster Management: CVSS (Max): 10.0 Multiple security issues and bugs have been fixed in Red Hat Advanced Cluster Management for Kubernetes Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week In Review for September 9th 2022

Greetings, The Asia Pacific Computer Emergency Response Team (APCERT) recently conducted its annual drill, a means of maintaining and improving awareness and skills within the cyber security community through this collaborative undertaking. The APCERT drill aims to maintain and progress internet security and safety with the exercise, allowing participants to improve communication protocols, technical responses, and the overall quality of incident responses. Our recent blog provides insight into what took place and what was learnt, including solutions to real-world situations and challenges. You can read more about this year’s APCERT Cyber Drill HERE. R U OK? Day was held yesterday, September 8, which promoted the power and importance a question can have. It has been demonstrated that a conversation can change a life and we at AUSCERT had one of our own with Dr Carla Rogers. A renowned Holistic Psychologist, Dr Rogers is featured in our latest episode of Share Today, Save Tomorrow where she discusses the connection between mind and body along with techniques to help individuals identify, treat and overcome challenges in the workplace. Lastly, AUSCERT is really interested in how you and your organisation use Cyber Threat Intelligence (CTI). We want to know about this to inform the services we provide to our members, and to ensure we’re doing the best we can to meet your needs. We’re running some short (1 hour) information gathering sessions via video conference so we can pick your brain about CTI. What’s in it for you? You’ll get to contribute your opinion about CTI so we can improve the services we provide to you and your organisation. You’ll have the opportunity to exchange information with other AUSCERT members and learn from their experiences. You’ll get the lovely warm* inner glow that comes from knowing you have performed a good deed by helping us help you. Please register your interest here. *Actual amount of warm inner glow varies from person to person. Google Releases Urgent Chrome Update to Patch New Zero-Day Vulnerability Date: 2022-09-03 Author: The Hacker News [Refer to Security Bulletin ESB-2022.4344] Google on Friday shipped emergency fixes to address a security vulnerability in the Chrome web browser that it said is being actively exploited in the wild. The issue, assigned the identifier CVE-2022-3075, concerns a case of insufficient data validating in Mojo, which refers to a collection of runtime libraries that provide a platform-agnostic mechanism for inter-process communication (IPC). An anonymous researcher has been credited with reporting the high-severity flaw on August 30, 2022. New EvilProxy service lets all hackers use advanced phishing tactics Date: 2022-09-05 Author: Bleeping Computer A reverse-proxy Phishing-as-a-Service (PaaS) platform called EvilProxy has emerged, promising to steal authentication tokens to bypass multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI. The service enables low-skill threat actors who don’t know how to set up reverse proxies to steal online accounts that are otherwise well-protected. Reverse proxies are servers that sit between the targeted victim and a legitimate authentication endpoint, such as a company’s login form. When the victim connects to a phishing page, the reverse proxy displays the legitimate login form, forwards requests, and returns responses from the company’s website. Fake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan Date: 2022-09-05 Author: The Hacker News The notorious Android banking trojan known as SharkBot has once again made an appearance on the Google Play Store by masquerading as antivirus and cleaner apps. “This new dropper doesn’t rely on Accessibility permissions to automatically perform the installation of the dropper Sharkbot malware,” NCC Group’s Fox-IT said in a report. “Instead, this new version asks the victim to install the malware as a fake update for the antivirus to stay protected against threats.” The apps in question, Mister Phone Cleaner and Kylhavy Mobile Security, have over 60,000 installations between them and are designed to target users in Spain, Australia, Poland, Germany, the U.S., and Austria. Home Affairs Could Be Looking Into TikTok’s Data Practices Date: 2022-09-05 Author: Gizmodo Back in July, we brought it to your attention that an investigation found that using TikTok on your phone gives the app access to your personal information. A lot of it, in fact. Analysis by Australian cybersecurity firm Internet 2.0 found TikTok requests almost complete access to the contents of a phone while the app is in use. That data includes calendar, contact lists and photos. As a result, the Australian Department of Home Affairs is going to be looking into the data harvesting practices of both TikTok and WeChat. QNAP patches zero-day used in new Deadbolt ransomware attacks Date: 2022-09-05 Author: Bleeping Computer QNAP is warning customers of ongoing DeadBolt ransomware attacks that started on Saturday by exploiting a zero-day vulnerability in Photo Station. The company has patched the security flaw but attacks continue today. “QNAPÂŽ Systems, Inc. today detected the security threat DEADBOLT leveraging exploitation of Photo Station vulnerability to encrypt QNAP NAS that are directly connected to the Internet,” explains the security notice. Ransomware gang’s Cobalt Strike servers DDoSed with anti-Russia messages Date: 2022-09-07 Author: Bleeping Computer Someone is flooding Cobalt Strike servers operated by former members of the Conti ransomware gang with anti-Russian messages to disrupt their activity. The operators of Conti ransomware completed turning off their internal infrastructure in May this year but its members have dispersed to other ransomware gangs, such as Quantum, Hive, and BlackCat. However, former Conti members continue to use the same Cobalt Strike infrastructure to conduct new attacks under other ransomware operations. Microsoft mistakenly rated Chromium, Electron, as malware Date: 2022-09-05 Author: The Register Microsoft appears to have fixed a problem that saw its Defender antivirus program identify apps based on the Chromium browser engine and/or Electron JavaScript framework as malware, and suggest users remove them. Numerous social media and forum posts made over the weekend detail how Windows has produced a warning of “Behavior:Win32/Hive.ZY” when users run everyday applications like Google’s Chrome browser or the Spotify music streamer. ESB-2022.4345 – WordPress: CVSS (Max): None WordPress has released WordPress 6.0.2 which includes 12 bug fixes on Core, 5 bug fixes for the Block Editor, and 3 security fixes. ESB-2022.4460 – Android OS: CVSS (Max): 9.8* Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. Google encourages all users to update to the latest version of Android where possible. ESB-2022.4472 – Linux kernel (Raspberry Pi): CVSS (Max): 8.2 Ubuntu reports the security issues detected in Linux kernel for Raspberry Pi systems can be fixed by applying the latest updates. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more