Week in review

AUSCERT Week in Review for 1st November 2019

AUSCERT Week in Review for 1st November 2019 Greetings, As the week comes to a close, here are some articles that may help ease you into the weekend. xHelper Trojan Variant Reinstalls Itself After Removal, Infects 45K Date published: 29/10/2019 Author: Sergiu Gatlan Excerpt: “While the infection vector used by the threat actor behind the new xHelper variant is not yet known, Symantec’s research team suspects that the app component that bundles the xHelper payloads is downloaded by a malicious system app that might come pre-installed on some smartphone brands. The fact that “numerous users have been complaining on forums about the persistent presence of this malware on their devices, despite performing factory resets and manually uninstalling it,” seems to further consolidate their hypothesis. — xHelper reports can be found on Reddit and Google Play’s Help forums. The number of devices infected with the xHelper Android malware grows each day, since “in the past month alone, there was an average of 131 devices infected each day, and an average of 2,400 devices persistently infected throughout the month,” as Symantec’s research team adds.” Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users Date published: 29/10/2019 Author: Swati Khandelwal Excerpt: “Developed by NSO Group, Pegasus allows access to an incredible amount of data from victims’ smartphones remotely, including their text messages, emails, WhatsApp chats, contact details, calls records, location, microphone, and camera. Pegasus is NSO’s signature product that has previously been used against several human rights activists and journalists, from Mexico to the United Arab Emirates two years ago, and Amnesty International staffers in Saudi Arabia and another Saudi human rights defender based abroad earlier last year. Though NSO Group always claims it legally sells its spyware only to governments with no direct involvement, WhatsApp head Will Cathcart says the company has evidence of NSO Group’s direct involvement in the recent attacks against WhatsApp users.” Industrial equipment to come under fire at the world’s largest hacking contest Date published: 28/10/2019 Author: Catalin Cimpanu Excerpt: “Industrial equipment will be the primary focus of the next edition of Pwn2Own, the world’s largest and most well-known hacking contest. This is the first time that security researchers will be allowed to hack ICS (industrial control systems) software and protocols at Pwn2Own. For most of its 12-year history, the contest has featured browsers and operating systems as the primary targets for white-hat hackers looking to make a name for themselves and earn huge cash rewards. In recent years, contest organizers have been diversifying the target portfolio with virtual machines, Tesla cars, and even Facebook Portal devices. Now, the organizers, Trend Micro’s Zero-Day Initiative (ZDI) project, say the next Pwn2Own contest will be solely focused on ICS devices and their respective software.” Johannesburg Authorities Refuse to Pay Hackers’ Bitcoin Ransom Date published: 30/10/2019 Authors: Marie Huillet Excerpt: “Authorities in Johannesburg are holding firm in their refusal to pay a ransom of 4 Bitcoin to hackers who targeted municipal systems last week. In a statement posted to its official Twitter handle on Oct. 28, the Johannesburg city council confirmed the attack had affected services that included billing, property valuation and land information systems, as well as its eHealth and Libraries services. The breach, which occurred on Oct. 24, was accompanied by a ransom demand of 4 Bitcoin (BTC) — worth close to $37,000 to press time — payable by Oct. 28.” New Adwind Variant Targets Windows, Chromium Credentials Date published: 29/10/2019 Authors: Lindsey O’Donnell Excerpt: “Once delivered, this new Adwind variant obfuscates the initial JAR file, blocking against any signature-based detection methods. “Malware that takes advantage of common Java functionality is notoriously difficult to detect or detonate in a sandbox for the simple fact that Java is so common on the web,” researchers with Menlo Security said in a Tuesday post. “In fact, any effort to block or limit Java would result in much of the internet breaking down — a non-starter for users who increasingly rely on rich web apps or SaaS platforms for their day-to-day responsibilities.” The JAR file then decrypts and loads a loader, which then loads an initial set of modules and sends out a request that is responsible for initializing the RAT with the command-and-control (C2) server.” Here are this week’s noteworthy security bulletins: 1) ALERT php5: Execute arbitrary code/commands – Remote/unauthenticated https://portal.auscert.org.au/bulletins/ESB-2019.3963/ Debian released an update to address a buffer underflow vulnerability in its php5-fpm implementation. The vulnerability, CVE-2019-11043, is being actively exploited in the wild to perform remote code execution. PHP 5.6 reached End Of Life on 1st January 2019. Updates to address the same vulnerability followed for php7.0, php7.3 on Debian, Ubuntu and SUSE. 2) Fortiguard FortiClient: Root compromise – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.4008/ Forticlient end point protection solution for Mac OS received a fix to address a local security check bypass. This could result in local command execution with root privileges. The vulnerability arose due to improper sanitisation of special elements in a command. 3) Apple MacOS: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ESB-2019.4010/ Apple released a bunch of security fixes for its products; MacOS, iOS, iPadOS, TV, Watch and Safari. Needless to say, the fixed vulnerabilities ranged from UI spoofing to remote code execution. 4) sudo: Root compromise – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3979/ Red Hat released an update to fix a privilege escalation vulnerability which allowed a local attacker to execute privileged commands by leveraging the “Runas” specification, effectively bypassing the need to authenticate as root. Red Hat has stated: “This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example: someuser myhost = (ALL, !root) /usr/bin/somecommand” ..and with that, have a great weekend all!  Nick

Learn more

Week in review

AUSCERT Week in Review for 25th October 2019

AUSCERT Week in Review for 25th October 2019 Greetings, This week we saw both Google and Mozilla release updates to patch multiple vulnerabilities in the Chrome and Firefox browsers, part of the on-going battle to ensure we are a little safer whilst we battle the web. Additionally, with consumer protection in mind, Apple pulled eighteen malicious apps from the iOS store, whilst on Google Play Store, forty two adware Android apps were removed.  However, despite measures taken by vendors to protect us from the ‘evilz’, we must still remember that have to take responsibility for our own actions and choices.  Be vigilant with your app choice and always perform due diligence. Every day we are more invested in staying connected to both people and systems, and Naked Security informed audiences in an article this week that people still think of phishing as being solely an email borne scam. However, the article correctly reminded readers that the technique is applied by scammers to communications streams available on our electronic devices, including social message, instant messaging and SMS text messages. Please feel free to dive into the associated articles:——————————————————————————– iBye, bad guy: Apple yanks 18 iOS store apps that sheltered advert-mashing malwareDate: October 24Author: The Register 42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese StudentDate: October 24Author: The Hacker News Phishy text message tries to steal your cellphone accountDate: October 18Author: Naked Security ——————————————————————————– Here are four of this week’s interesting security bulletins: ASB-2019.0308Google Chrome was patched to resolve multiple vulnerabilities which when unpatched offered an interesting selection of impact/access factors. ESB-2019.3941Mozilla also patched multiple vulnerabilities in Firefox, resolving a bunch of ‘Remote with User Interaction’ associated impacts. ESB-2019.3947Red Hat plugged a nifty vulnerability related to little old sudo which researchers found would lead to root compromise when exploited. ESB-2019.3958VMware issued update to resolve a vulnerability associated with its vCenter Server Appliance, addressing a sensitive information disclosure vulnerability (remote unauthenticated) in backup and restore. ——————————————————————————– As always, stay safe, stay patched, and make it a good weekend! Best regards,Colin and Patch the AUSCERT cat

Learn more

Week in review

AUSCERT Week in Review for 18th October 2019

AUSCERT Week in Review for 18th October 2019 Greetings, This week we saw Oracle release its quarterly “Critical Patch Updates,Alerts and Bulletins”. Numerous vulnerabilities and patches were reportedin their broad range of products, that will need to be managed. We canexpect many other vendors to release patches over the next few weeks fortheir products which might be built around Oracle technologies includingdatabases and Java products. Please refer to our webpage for details of upcoming events – hosted bothby AUSCERT as well as other industry groups:https://wordpress-admin.auscert.org.au/resources/events/ — Here’s a summary (including excerpts) of some of the more interestingstories we’ve seen this week: Title: Germany’s cyber-security agency recommends Firefox as most secure browserhttps://www.zdnet.com/article/germanys-cyber-security-agency-recommends-firefox-as-most-secure-browser/Author: Catalin CimpanuDate: 17 October 2019Excerpt:“Germany’s BSI tested Firefox, Chrome, IE, and Edge. Firefox was onlybrowser to pass all minimum requirements for mandatory security features.” Title: Sudo? More like Su-doh: There’s a fun bug that gives restrictedsudoers root access (if your config is non-standard)https://www.theregister.co.uk/2019/10/14/linux_sudo_security_bug/Author: Chris WilliamsDate: 14 October 2019Excerpt:“Linux users who are able to run commands as other users, via the sudoermechanism, though not as the all-powerful root user, can still run commandsas root, thanks to a fascinating coding screw-up.” Title: MacGibbon joins local cyber security push to challenge multinationalshttps://www.itnews.com.au/news/macgibbon-joins-local-cyber-security-push-to-challenge-multinationals-532376/Author: Justin HendryDate: 15 October 2019Excerpt:“Two of Australia’s most high-profile IT executives have joined forcesto form the nation’s largest dedicated cyber security company, a movethat directly challenges the dominance of large US-affiliated vendors insecuring key contracts with major corporates and government.” Title: ATO phone scammers turn up at Adelaide man’s house dressed as police with eftpos machinehttps://www.abc.net.au/news/2019-10-15/ato-scammers-turn-up-at-house-with-eftpos-machine/11603144/Author: Eugene BoisvertDate: 16 October 2019Excerpt:“Two men turned up to another man’s house with an eftpos machine demandingmoney after earlier calling him pretending to be from the AustralianTaxation Office (ATO), according to SA Police.” Title: Planting tiny spy chips in hardware can cost as little as $200https://arstechnica.com/information-technology/2019/10/planting-tiny-spy-chips-in-hardware-can-cost-as-little-as-200/Author: Andy GreenbergDate: 13 October 2019Excerpt:“Proof-of-concept shows how easy it may be to hide malicious chips insideIT equipment.” — Here are some of this week’s noteworthy security bulletins (in no particularorder): ESB-2019.3826 – [UNIX/Linux][Ubuntu] sudo: Root compromise – Existing accounthttps://portal.auscert.org.au/bulletins/ESB-2019.3826/– See article above for discussion of issue. ASB-2019.0294 – [Win][UNIX/Linux] Oracle Java SE: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/ASB-2019.0294/– One of the outputs from Oracle’s CPU this week. ESB-2019.3835 – [SUSE] linux kernel: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/ESB-2019.3835/– Another root compromise vulnerability. ESB-2019.3881 – [Cisco] Cisco Identity Services Engine: Multiplevulnerabilitieshttps://portal.auscert.org.au/bulletins/ESB-2019.3881/– Cisco had a big week too reporting vulnerabilities and patches, this isone of those. ESB-2019.3861 – [Win][Mac] Acrobat and Reader: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/ESB-2019.3861/– 68 CVEs reported! — Stay safe, stay patched and have a great weekend,Marcus.  

Learn more

Week in review

AUSCERT Week in Review for 11th October 2019

AUSCERT Week in Review for 11th October 2019 Greetings, In the words of the Beatles, “it’s getting better all the time”. That is, flawed software is always being discovered and fixed. A cynic might add that flawed software is being created faster than the fix process can keep up. Microsoft’s monthly Patch Tuesday came and went this week without any major dramas, but popular macOS terminal app iTerm fixed a major RCE thanks to research funded by Mozilla, and D-Link have given up entirely on certain home routers, leaving them open to any botnet which will have them. Critical Security Issue identified in iTerm2 as part of Mozilla Open Source Audit Date: 2019-10-09 Author: The Hacker News A 7-year-old critical remote code execution vulnerability has been discovered in iTerm2 macOS terminal emulator app—one of the most popular open source replacements for Mac’s built-in terminal app. Tracked as CVE-2019-9535, the vulnerability in iTerm2 was discovered as part of an independent security audit funded by the Mozilla Open Source Support Program and conducted by cybersecurity firm Radically Open Security. “MOSS selected iTerm2 for a security audit because it processes untrusted data, and it is widely used, including by high-risk targets (like developers and system administrators),” Mozilla says. ‘Hypocritical and ironic’: NSA whistleblower dropped from speaking at Melbourne cybersecurity conference Date: 2019-10-08 Author: ABC News A high-profile American whistleblower and a privacy researcher have been unexpectedly dropped from addressing a Government-backed cybersecurity event underway in Melbourne. Thomas Drake and Dr Suelette Dreyfus of the University of Melbourne were both told their talks were “incongruent” with CyberCon, despite being invited to speak months earlier. Mr Drake’s presentation was to address national security and surveillance, while Dr Dreyfus planned to explore the use of safe digital drop boxes for anti-corruption whistleblowing. Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills Date: 2019-10-09 Author: BLEEPING COMPUTER A billing notice from a vendor, especially one like Amazon, that states that your account has been suspended for unpaid bills, may confuse a user enough to click on the email link. Attackers are capitalizing on this confusion by sending emails that pretend to be from Amazon AWS Support at postmaster@amazon.com and that use a subject of “Your service has now been suspended”. D-Link Home Routers Open to Remote Takeover Will Remain Unpatched Date: 2019-10-07 Author: ThreatPost D-Link won’t patch a critical unauthenticated command-injection vulnerability in its routers that could allow an attacker to remotely take over the devices and execute code. The vulnerability (CVE-2019-16920) exists in the latest firmware for the DIR-655, DIR-866L, DIR-652 and DHP-1565 products, which are Wi-Fi routers for the home market. With no patch available, affected users should upgrade their devices as soon as possible. Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers’ Interaction Date: 2019-10-04 Author: The Hacker News Almost every application contains security vulnerabilities, some of which you may find today, but others would remain invisible until someone else finds and exploits them—which is the harsh reality of cybersecurity and its current state. And when we say this, Signal Private Messenger—promoted as one of the most secure messengers in the world—isn’t any exception. Google Project Zero researcher Natalie Silvanovich discovered a logical vulnerability in the Signal messaging app for Android that could allow malicious caller to force a call to be answered at the receiver’s end without requiring his/her interaction. Australia, US negotiate CLOUD Act data swap pact Date: 2019-10-08 Author: iTnews Australian law enforcement and national security agencies are set to have greater access to data held by US-based cloud providers under an agreement being negotiated with the US government. But the bilateral agreement, if finalised and approved, will also require Australian-based cloud providers to hand over data requested by US law enforcement authorities. Short October Patch Tuesday Includes Remote Desktop Client, Browser, and Authentication Patches Date: 2019-10-08 Author: TrendLabs Security Intelligence Blog October’s Patch Tuesday is relatively modest, with Microsoft releasing a total of 59 patches. However, this shorter list still warrants attention. Nine of the 59 were still identified as Critical, while the remaining 50 were labeled Important. Most of the critical bulletins were for various Internet Explorer and Microsoft Edge vulnerabilities, with one covering a Remote Desktop Client vulnerability. The Important bulletins fixed several issues, including NLTM and Microsoft IIS server vulnerabilities. 10 Steps to Assess SOC Maturity in SMBs Date: 2019-10-07 Author: Dark Reading Facing a system and organisation controls audit doesn’t have to be stressful for small and midsize businesses if they follow these guidelines. Preparing for a system and organisation controls (SOC) compliance audit for the first time can be challenging. Many organisations, especially small to midsize businesses (SMBs), underestimate the level of planning and effort that goes into completing a successful SOC audit, adding to their security-related stress. Without proper preparation, SMBs risk missing milestones and deadlines, which can result in additional fees to complete a SOC audit. Addressing these 10 questions can help an organisation prevent delays, determine their level of preparedness to complete an audit, and hopefully limit unnecessary work and effort from process owners and employees critical to the business. Yes, MFA Isn’t Perfect. But That’s Not a Reason for Your Company Not to Use It Date: 2019-10-08 Author: Bitdefender When computer users and businesses ask me for a single step they could take to dramatically enhance their security it’s easy to answer: enable multi-factor authentication. Multi-factor authentication (MFA) offers an additional layer of protection for accounts that means even if a criminal manages to phish, guess or crack your password, even if a data breach spills your login credentials, there’s a very good chance your account won’t be compromised. Multi-factor authentication is a great way to improve your security from some of the most common attacks that are out there, but that’s not to say it’s perfect. Stay safe, stay patched and have a good weekend! Patch the AUSCERT cat

Learn more

Week in review

AUSCERT Week in Review for 4th October 2019

AUSCERT Week in Review for 4th October 2019 AUSCERT Week in Review04 October 2019 This week the ANU publicly released their report on the Nov 2018 breach oftheir administrative systems. This report is unique in that, as per thereport’s Forward, “provides details on the attack including the methodsused by the attacker” and “this publicly available report is the first ofits kind in Australia following a cyber attack on a public institution”. Members are encouraged to review the report to understand some of thethreats also faced by them and where possible incorporate the valuablelessons learned.     New Checkm8 jailbreak released for all iOS devices running A5 to A11 chipsDate: 27 SeptemberAuthor: ZDNet A security researcher has released today a new jailbreak that impactsall iOS devices running on A5 to A11 chipsets — chips included in allApple products released between 2011 and 2017, spanning eight generationsof devices, from iPhone 4S to iPhone 8 and X. Victorian hospitals targeted in ransomware attackDate: 1 OctoberAuthor: ABC News The Victorian Government is investigating the scale of a ransomwareattack by “sophisticated cyber criminals” on some of the state’s majorregional hospitals that has forced healthcare providers to go offline. Critical Remote Code Execution Vulnerability Patched in Exim Email ServerDate: 1 October A Critical vulnerability recently addressed in the popular open-sourceemail server Exim could lead to remote code execution.   Inside a massive cyber hack that risks compromising future leaders around the globeDate: 2 October Without anyone clicking on a link, a massive cyber attack of unprecedentedsophistication gained access to private information of potentiallyhigh-ranking officials across the globe. Thanks to the release of a 5,000-word report into the incident, the publiccan see for the fist time how sophisticated and extensive the attack onthe ANU was.   ANU hackers built ‘shadow ecosystem’ to stay hidden for six weeksDate: 3 October  

Learn more

Week in review

AUSCERT Week in Review for 27th September 2019

AUSCERT Week in Review for 27th September 2019 Greetings, This week has been a mix of something old and something new. On the old side, a vBulletin zero-day gained attention, and whilst this was shocking news to some, it was old news to others as we learned it had been an exploited commodity for years. It’s good to be in the know it seems. Being in the know was echoed by Atlassian who published a community article stating their intention to retire support for Internet Explorer, coming at the same time as ZDNet’s report that Microsoft had released two brand-spanking patches, one to plug an IE zero-day, and the other squash a Defender bug. In a change of tact, interesting to hear that hackers are looking into new methods of injecting card stealing code on “Layer 7” routers to steal payment card details, instead of utilising websites. Whether this focus change is due to frustration in having their lovingly crafted websites taken-down, or in wanting to remain undetected for longer, one things is certain, this should highlight an organisations need to perform effective asset management and patch management practices. And in considering vulnerable assets, we should also consider those non-traditional or non-managed devices that connect to our networks and become potential threat vectors. As remote working practices are becoming more widely accepted, InsiderPro reported to the evolution of the Bring Your Own Device (BYOD) policy has recently raised discussions regarding Bring Your Own Office (BYOO). Perhaps it’s time to splash out on two sweet 27″ monitors for your home office. Lastly, a reminder to both enterprise and consumers that Windows 7 support will end on 14 January 2020, so perhaps new year, new secure you! And if you’re an Apple device user, then definitely check Wired’s article for checking your iOS 13 privacy and security features. vBulletin Zero-Day Exploited for Years, Gets Unofficial PatchDate: 25 SeptemberAuthor: BleepingComputer A zero-day exploit for the vBulletin forum platform was publicly disclosed and quickly used to attack affected versions of the forum software. It turns out, though, that this exploit has been known, utilized, and sold by researchers and attackers for years. Retiring IE11 support for Atlassian cloud, server, and data center productsDate: 23 SeptemberAuthor: AtlassianURL: https://community.atlassian.com/t5/Feedback-Forum-articles/Retiring-IE11-support-for-Atlassian-cloud-server-and-data-center/ba-p/1185312 In 2015 Microsoft released Edge as the browser to supersede Internet Explorer (IE). Since then IE has not received major updates, or added support for many modern web standards. Microsoft recently discouraged the use of Internet Explorer as a default browser, and we’ve also seen a decrease in IE11 usage across our cloud, server, and data center products over time. To allow us to continue to take advantage of modern web standards to deliver improved functionality and the best possible user experience across all of our products, we have decided to end support for IE11. Microsoft releases out-of-band security update to fix IE zero-day & Defender bugDate: 23 SeptemberAuthor: ZDNet Microsoft has released an emergency out-of-band security update today to fix two critical security issues — a zero-day vulnerability in the Internet Explorer scripting engine that has been exploited in the wild, and a Microsoft Defender bug.The updates stand out because Microsoft usually likes to stay the course and only release security updates on the second Tuesday of every month. The company rarely breaks this pattern, and it’s usually only for very important security issues. Hackers looking into injecting card stealing code on routers, rather than websitesDate: 25 SeptemberAuthor: ZDNet Security researchers at IBM have found evidence that hackers have been working on creating malicious scripts they can deploy on commercial-grade “Layer 7” routers to steal payment card details. Why your company needs a BYOO (bring your own office) policyDate: 23 SeptemberAuthor: InsiderPro Remote work is not a trend. It’s there to stay. Insider Pro columnist Mike Elgan explains why it’s time to re-orient your organisation’s thinking around workshifting and BYOO. Just as the reality of consumer devices drove the BYOD policy trend, the reality of remote work demands the systematic thinking and communication of a bring your own office (BYOO) policy. Windows 7 support will end on January 14, 2020Date: Aug 3, 2019Author: Microsoft Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 will be January 14, 2020. After that, technical assistance and software updates from Windows Update that help protect your PC will no longer be available for the product. The iOS 13 Privacy and Security Features You Should KnowDate: 22 SeptemberAuthor: WIRED Your iPhone just got a major security upgrade. The reputation of iOS security may have taken some dings of late, but it’s still one of the most secure consumer operating systems available. Here are all the ways the latest version keeps you even more protected. Here are some noteworthy bulletins from the week: ESB-2019.3609Adobe ColdFusion patched to resolve two critical and one important vulnerability. ESB-2019.3617Cisco IOx multiple vulnerabilities. ESB-2019.3616Cisco IOS XR root compromise vulnerability. ESB-2019.3648Confidential data access vulnerabilities patched in Apple iOS and iPadOS. ESB-2019.3641Apple iOS, macOS and watchOS were all patched due to an out-of-bounds readwith significant implications. As always, stay safe, stay patched, and make it a good weekend!Colin

Learn more

Week in review

AUSCERT Week in Review for 13th September 2019

AUSCERT Week in Review for 13th September 2019 Greetings, This week has been a busy one with Microsoft patch Tuesday, a serious Exim vulnerability being actively exploited and other potentially life threatening medical equipment vulnerabilities being exposed. All in all, just another day at the office! As the week comes to a close, here are some articles that may help ease you into the weekend. ThreatList: Amidst Data Breaches, Account Creation Fraud Soars in 2019 Date published: 10/09/2019  Author: Tara Seals Excerpt: “The first half of 2019 saw a 13 percent increase in fraudulent activity compared to the previous six months, with a spike in June representing the highest-volume bot attack that’s been recorded since 2016, according to an analysis from LexisNexis. The firm’s report, with data gleaned from 277 million human-initiated attacks across its Digital Identity Network, shows that bot attacks focused on new account creations are on the rise, bent on building fake online identities across diverse sectors. This type of attack is the only criminal “use case” that saw growth in the study period. The June attack targeted a virtual gift-card provider, with a bot trying to set up accounts using different email addresses. LexisNexis found that the attack originated in the U.S., but the browser language was set to Russian.” Weakness in Intel chips lets researchers steal encrypted SSH keystrokes Date published: 11/09/2019 Author: Dan Goodin Excerpt: “The researchers have named their attack NetCAT, short for Network Cache ATtack. Their research is prompting an advisory for Intel that effectively recommends turning off either DDIO or RDMA in untrusted networks. The researchers say future attacks may be able to steal other types of data, possibly even when RDMA isn’t enabled. They are also advising hardware makers do a better job of securing microarchitectural enhancements before putting them into billions of real-world servers. “While NetCAT is powerful even with only minimal assumptions, we believe that we have merely scratched the surface of possibilities for network-based cache attacks, and we expect similar attacks based on NetCAT in the future,” the researchers, from the Vrije Universiteit Amsterdam and ETH Zurich, wrote in a paper published on Tuesday. “We hope that our efforts caution processor vendors against exposing microarchitectural elements to peripherals without a thorough security design to prevent abuse.”” Fake PayPal Site Spreads Nemty Ransomware Date published: 08/09/2019 Author: Ionut Ilascu Excerpt: “The automated analysis showed that it took about seven minutes for the ransomware to encrypt the files on the victim host. However, this may differ from one system to another. Fortunately, the malicious executable is detected by most popular antivirus products on the market. A scan on VirusTotal shows that it is detected by 36 out of 68 antivirus engine.” Threats to macOS users Date published: 11/09/2019 Authors: Mikhail Kuzin, Tatyana Shcherbakova, Tatyana Sidorina, Vitaly Kamluk Excerpt: “The belief that there are no threats for the macOS operating system (or at least no serious threats) has been bandied about for decades. The owners of MacBooks and iMacs are only rivaled by Linux users in terms of the level of confidence in their own security, and we must admit that they are right to a certain degree: compared to Windows-based systems, there are far fewer threats that target macOS. However, the main reason for this is the number of potential victims: there are many more computers running Windows than those running macOS. However, the situation is changing, since the popularity of the latter platform is growing. Due to this and despite all the efforts that have been taken by the company, the threat landscape for Apple devices is changing, and the amount of malicious and unwanted software is growing. For the purposes of this report we used the statistics from Kaspersky Security Network cloud infrastructure. It stores information about all of the malicious programs and other threats that our macOS product users agreed to anonymously share with us. In fact, all these threats at some point attacked the computers of Kaspersky security solution users, but these attacks were successfully repelled.” COBALT DICKENS Goes Back to School…Again Date published: 11/09/2019 Authors: Secureworks Counter Threat Unit Research Team Excerpt: “For this campaign, the threat actors registered at least 20 new domains targeting over 60 universities in Australia, the United States, the United Kingdom, Canada, Hong Kong, and Switzerland. These domains were registered using the Freenom domain provider, which administers the following free top-level domains (TLDs) unless the domain is considered “special”: .ml .ga .cf .gq .tk   Many of these domains use valid SSL certificates, likely to make the spoofed pages appear authentic. The overwhelming majority of the certificates observed in 2019 were issued by Let’s Encrypt, a nonprofit organization that programmatically issues free certificates. However, past campaigns used certificates issued by the Comodo certificate authority.”   Here are this week’s noteworthy-ish security bulletins: 1) Microsoft Windows: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ASB-2019.0257/ Microsoft Patch Tuesday (or Wednesday in this part of the world) saw the release of security updates for multiple Microsoft products. These included Edge, Internet Explorer (surprise, surprise), Exchange server, Office, Skype, etc. The update for Windows had a rather small 49 vulnerabilities addressed within it, including multiple remote code execution vulnerabilities and privilege escalation vulnerabilities. 2) UPDATED ALERT exim4: Root compromise – Remote/unauthenticated https://portal.auscert.org.au/bulletins/ESB-2019.3394.2/ This was published, and then, republished as an alert when a malware campaign involving the installation of LILOCKED ransomware in Linux servers by gaining root access on those servers. Chatter from a Russian-language blog indicated exim as a potential vector employed by the malware authors gain root privileges within the target servers. If you want to to learn more, see https://twitter.com/threatbear_co/status/1170876973436022785?s=20 3) Becton, Dickinson and Company Pyxis: Unauthorised access – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3404/ The weekly roundup just wouldn’t be complete without a medical industry related vulnerability. This particular session fixation vulnerability could allow an attacker who has gained prior access to a lower privileged account within the Pyxis medication management platform, to re-use a higher privileged users Active Directory credentials, thereby increasing his privileges within the platform. At that point, the attacker could view patient data and medication details and potentially alter medication records within the platform. 4) Adobe Flash Player: Execute arbitrary code/commands – Remote with user interaction https://portal.auscert.org.au/bulletins/ASB-2019.0264/ Adobe got a bit of security love from Microsoft as part of its updates. Just two “critical” remote code execution vulnerabilities being addressed this time around. Adobe also released an update fixing a remote code execution vulnerability in its Application Manager software. 5) curl: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ESB-2019.3472/ Last but not least, everyone’s favourite url retrieval tool, curl, got an update for two remote code execution vulnerabilities which stem from it incorrectly handling memory when performing transfer of TFTP or when using Kerberos over FTP. ..and with that, have a great weekend all!  Nick

Learn more

Week in review

AUSCERT Week in Review for 6th September 2019

AUSCERT Week in Review for 6th September 2019 Greetings, Ask yourself this question. “Should I always believe what you see (or hear)?” As the week comes to a close, here are some articles that may help ease you into the weekend. Privacy concerns mount over Chinese face-swap app Zao Date published: 03/09/2019  Author: Mark Wycislik-Wilson Excerpt: “Zao — a Chinese face-swapping app with the potential to be used to create deepfakes — went viral over the weekend, shooting to the top of the App Store download charts. But concerns have been raised not only over the potential for the app to be abused, but also over its privacy policies. Of particular concern are clauses which grant the developers “free, irrevocable, permanent, transferable, and relicense-able” rights over users’ photos. Zao responded by tweaking its privacy policy, but complaints are still flooding in.” Nemty Ransomware Gets Distribution from RIG Exploit Kit Date published: 03/09/2019 Author: Ionut Ilascu Excerpt: “BleepingComputer saw that the post-encryption ransom demand was around $1,000 in bitcoin. Unfortunately, there is no free decryption tool available at the moment and the malware makes sure to remove the file shadows created by Windows. Security researcher Mol69 noticed that the file-encrypting malware is now a payload in malvertising campaigns from RIG exploit kit (EK). The malware used the .nemty extension for the encrypted files but the variant observed by Mol69 adds ‘._NEMTY_Lct5F3C_’ at the end of the processed files.” Scammer Successfully Deepfaked CEO’s Voice To Fool Underling Into Transferring $243,000 Date published: 03/09/2019 Author: Jennings Brown Excerpt: “The CEO of an energy firm based in the UK thought he was following his boss’s urgent orders in March when he transferred funds to a third-party. But the request actually came from the AI-assisted voice of a fraudster.” Threat Actor behind Astaroth is now using Cloudflare Workers to bypass your Security Solutions. Date published: 01/09/2019 Author: Marcel Afrahim Excerpt: “You might have seen the recently published report about a widespread fileless campaign called Astaroth by Microsoft Research Team that completely “lived off the land”: it only ran system tools throughout a complex attack chain. If you haven’t, you SHOULD definitely read the details of the research article done by the Microsoft team here. Following the report, the group behind the Astaroth attack campaign changed tactics and they ran a similar campaign again earlier in august with few changes, notably use of Cloudflare Workers. In this article I will try to show highlight the changes and show a clear chain of attack from the delivery till infection, something Microsoft research article failed to do.”   Here are this week’s noteworthy-ish security bulletins: 1) Firefox and Firefox ESR: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ASB-2019.0252/ Mozilla released updates for Firefox and Firefox ESR that addressed a large number of vulnerabilties, the most severe being a remote code execution vulnerability stemming from poor sanitization of logging related command line parameters. Luckily, this issue only affects Windows and not many people use that! 2) Cisco Small Business RV160, 260, and 340 Series VPN Routers: Root compromise – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3369/ A number of Cisco small business VPN routers have been identified as being affected by a number of vulnerabilities. The most important of these deal with hardcoded password hashes stored for the root user stored in the firmware and the ability to view undocumented user accounts, which includes the “root” account! If you own any of these, please read the bulletin and update! 3) Cisco Identity Services Engine: Cross-site scripting – Remote with user interaction https://portal.auscert.org.au/bulletins/ESB-2019.3364/ More from Cisco! Cisco fixed a reflected XSS vulnerability in web-based management interface of its ISE product. 4) Cisco Content Security Management Appliance – Access confidential data –Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3362/ Just one more Cisco bulletin. Cisco released a fix for an information disclosure vulnerability in its CCSM appliance, which originates from a role permissions implementation error allowing unauthorised access to other users spam folders, for example. Stay safe, stay patched, keep your eyes peeled and have a great weekend free of paranoia!  Nick

Learn more

Week in review

AUSCERT Week in Review for 20th September 2019

AUSCERT Week in Review for 20th September 2019 Greetings, This week’s big headline is the findings of the AFP and ASIC’s investigation into a cybercrime syndicate targeting Australian superannuation accounts. Also, Reuters (normally a relatively credible source) have published a story attributing the Australian parliament hack, albeit without official sources. More after the jump. China blamed for Australian parliament hackDate: 16 SeptemberAuthor: iTnews Australian intelligence determined China was responsible for a cyber-attack on its national parliament and three largest political parties before the general election in May, five people with direct knowledge of the matter told Reuters.The Australian Signals Directorate concluded in March that China’s Ministry of State Security was responsible for the attack, the five people said. Cyber fraud hits superannuation, share accountsDate: 17 SeptemberAuthor: iTnews Millions of dollars have allegedly been stolen from personal superannuation and share trading accounts using hijacked identity credentials that were obtained on the dark net.The Australian Federal Police and on Tuesday revealed the “multi-layered cybercrime activity” after a 12-month investigation into a major fraud and identity theft syndicate with the Australian Securities and Investment Commission. 400 Million Medical Radiological Images Exposed on the InternetDate: 18 SeptemberAuthor: Bleeping Computer An analysis of medical image storage systems exposed to the public web reveals that almost 600 servers in 52 countries are completely unprotected against unauthorized access.Audited systems were unpatched against thousands of vulnerabilities, more than 500 of them having the highest severity score. A Guide on 5 Common LinkedIn ScamsDate: 19 SeptemberAuthor: Tripwire The fact that scammers haunt Facebook and Twitter is not surprising. Even so, digital criminals don’t stop with just those two platforms. They’re also known to stalk users on LinkedIn where connections carry greater professional gravity.Fortunately, users can stay alert of such activity by familiarizing themselves with the most common types of LinkedIn scams. Here are five ruses, in particular, that should be on their radar. Here are some noteworthy bulletins from the week: 1. ESB-2019.3511 – Norton Password Manager information disclosureUnspecified information disclosure vulnerability in Symantec’s password manager for Android. 2. ESB-2019.3519 – IBus access control vulnerabilityUnintentional keylogger for different users on the same machine. 3. ESB-2019.3541 – Werkzeug cross-container accessThe debugger security PIN was not unique per Docker container. 4. ASB-2019.0268 – Mozilla Thunderbird web view fixesThunderbird’s email view disables scripting, but if the program is used “in browser or browser-like contexts”, it could be abused. Stay safe, stay patched, and have a good weekend!David

Learn more

Week in review

AUSCERT Week in Review for 30th August 2019

AUSCERT Week in Review for 30th August 2019 Greetings, As they say, out with the old, in with the new. Or should it be “out with the deprecated, in with the supported”?End-of-life is approaching for both Windows 7 and Python 2. But since they also say what goes around, comes around. So whilst “retro” can be considered cool in some circumstances, it cannot be considered so when retro to run with outdated IOS XE so go ahead and pick up your hardened version of the IOS XE software from Cisco today whilst stocks last. Monopoly is one retro game that seems to forever stay young. Community Chest: Drive past Jail and pick up iOS 12.4.1. Winner! As the week draws to a close, many webservers with HTTP/2 vulnerabilities have been patched over the last two weeks since they were reported by a Netflix researcher, so it’s good to hear of patching wins.   In the news this week: Windows 7 end of life: Months from patch cut-off, millions still haven’t upgradedAuthor: ZDNetDate published: 2019-08-28 With just under five months until Microsoft stops issuing free patches for Windows 7, millions of PCs are still relying on it, leaving them exposed to new bugs that will probably never be patched. Microsoft has been nagging Windows 7 users to upgrade to Windows 10 for years now, yet a huge number of consumers and smaller businesses have either resisted those calls or missed them. Cisco Fixes Critical Bug in Virtual Service Container for IOS XEAuthor: BleepingComputerDate published: 2019-08-28 Cisco today published an update for its IOS XE operating system to patch a critical vulnerability that could allow a remote attacker to bypass authentication on devices running an outdated version of virtual service containers. Exploitation is possible if specific conditions are met by simply sending malicious HTTP requests to a target device. If an administrator is into the REST API interface, an adversary can get their ‘token-id’ and run commands with elevated privileges. Time to shed Python 2Author: National Cyber Security Centre (UK)Date published: 2019-08-22 The end of life (EOL) date for Python 2 has been a long time coming, but it’s finally in sight. As of the 1st of January 2020, Python 2 will no longer be supported. There will be no more bug fixes, or security updates, from Python’s core developers. So, if you’re still using 2.x, it’s time to port your code to Python 3. If you continue to use unsupported modules, you are risking the security of your organisation and data, as vulnerabilities will sooner or later appear which nobody is fixing. Cyber security a key focus for Uni foreign interference taskforceAuthor: iTnewsDate published: 2019-08-29 The cyber resilience of Australia’s universities will be a key focus of a new federal government taskforce aimed at addressing foreign interference concerns in the higher education sector. Education minister Dan Tehan announced the creation of the University Foreign Interference Taskforce on Wednesday to assess the level of foreign interference in universities. Noteworthy bulletins this week: 1. Symantec Reporter: Access confidential data The Australian Taxation Office is credited as the source for this advisory. 2. Cisco IOS XE: Execute arbitrary code/commands A CVSSv3 score of 10/10 for a full authentication bypass. 3. h2o web server: Denial of Service – Remote/Unauthenticated The HTTP/2 vulnerabilities from a Netflix researcher have been patched in many webservers in the last fortnight, including h2o. 4. Apple iOS, macOS and tvOS: Root compromise – Existing Account Regression of a bugfix for a vulnerability used in jailbreaks in iOS 12.4 led to the hasty release of 12.4.1 with the jailbreak patched out. Reward yourself tonight or this weekend by putting up your feet, catching your favourite retro or modern show, or if books are more your thing, pick a good one. Stay safe, stay patched and have a great weekend!Colin

Learn more

Week in review

AUSCERT Week in Review for 2nd August 2019

AUSCERT Week in Review for 2nd August 2019 Greetings, This week we’ve seen a few noteworthy stories in the Information Security world. Over in the USA, the Capital One banking corporation suffered from a massive data breach, as millions of customers’ data were downloaded from an AWS S3 bucket with inappropriate permissions. In their notification, Capital One were quick to point out that “No bank account numbers or Social Security numbers were compromised, other than […] About 140,000 Social Security numbers […] About 80,000 linked bank account numbers”. Several Information Security pundits were quick to point out the audacity and dishonesty of this statement. AUSCERT recommends, and has always recommended, clarity and honesty when communicating data breaches. In other news, the Equifax credit reporting firm reached a settlement with the Federal Trade Commission last week, and any victims of the 2017 Equifax data breach can apply for reimbursement for any costs or losses incurred resulting from the breach, including the costs of applying for credit monitoring. Affected people may also make a claim for a cash settlement, which has been set at US$127 per person. Some might say this is small compensation for having your financial information leaked online, and I would agree with them. Closer to home, the AUSCERT office appears to be experiencing virus attacks of a more traditional nature – more than half of our staff have called in sick over this week. We hope you’re staying healthy by sanitising your inputs (air!), installing the latest (vitamin) updates, and quarantining any infected machines (family members) in an isolated environment! Here are some of the week’s noteworthy security stories (in no particular order): Title: Apple iMessage Flaw Lets Remote Attackers Read Files on iPhonesAuthor: Sergiu GatlanDate: July 29, 2019 Excerpt: “An iMessage vulnerability patched by Apple as part of the 12.4 iOS updateallows potential attackers to read contents of files stored on iOS devicesremotely with no user interaction, as user mobile with no sandbox.” —- Title: Capital One Says Breach Hit 100 Million Individuals in U.S.Author:  Christian Berthelsen, Matt Day, and William TurtonDate: July 30, 2019 Excerpt: “Capital One Financial Corp. said data from about 100 million people inthe U.S. was illegally accessed after prosecutors accused a Seattle womanidentified by Amazon.com Inc. as one of its former cloud service employeesof breaking into the bank’s server. While the complaint doesn’t identify the cloud provider that stored theallegedly stolen data, the charging papers mention information stored inS3, a reference to Simple Storage Service, Amazon Web Services’ populardata storage software.” —- Title: 200 million devices–some mission-critical–vulnerable to remote takeoverAuthor: Dan GoodinDate: July 30, 2019 Excerpt: “…Researchers with security firm Armis identified 11 vulnerabilities invarious versions of VxWorks, a slimmed-down operating system that runs onmore than 2 billion devices worldwide. Billed collectively as Urgent 11, the vulnerabilities consist of six remotecode flaws and five less-severe issues… None of the vulnerabilitiesaffects the most recent version of VxWorks–which was released lastweek–or any of the certified versions of the OS, including VxWorks 653or VxWorks Cert Edition.” —- Here are some of this week’s noteworthy security bulletins (in no particularorder): 1. ASB-2019.0226 – [Win][Linux] GitLab: Multiple vulnerabilities 2. ASB-2019.0224 – ALERT [Appliance] VxWorks: Multiple vulnerabilities 3. ESB-2019.2872 – [Win][UNIX/Linux][Ubuntu] Subversion: Denial of service – Remote/unauthenticated Stay safe, stay patched, and have a good weekend. Anthony

Learn more

Week in review

AUSCERT Week in Review for 23rd August 2019

AUSCERT Week in Review for 23rd August 2019 Greetings,“Buy the rumor, sell the news”.  Looks like media has gotten hold on to the fact that phisher’s are trying the best they can to add legitimacy of their phish sites any way they can. This instance is by using services that, when conducting a WHOIS, returns signs that the site “belongs” to the service being phished, trying to reduce the likelyhood of it being detected. Well, we have seen various versions of this tactic, for a while now, landing in AUSCERT triage.  It did provide for a change, but they get processed none-the-less. Although phishers are changing tactics, one thing does not change, users need to be aware when clicking links in emails.   As for news, here’s a summary (including excerpts) of some of the moreinteresting stories we’ve seen this week: ——- Phishing Attacks Scrape Branded Microsoft 365 Login PagesAuthor: Sergiu GatlanDate: August 21st, 2019 Excerpt: “An unusual new phishing campaign is probing email inboxes via attacks using the targets’ company-branded Microsoft 365 tenant login pages to add more legitimacy to the scam.  The attackers are also using Microsoft’s Azure Blob Storage and Microsoft Azure Web Sites cloud storage solutions to host their phishing landing pages, a common tactic used by phishers to trick their targets into thinking that they’re seeing an official Microsoft login page.  Using Azure Blob Storage object storage solution to host their phishing pages allows them to take advantage of the fact that they will automatically get signed with an SSL certificate from Microsoft.” ——- npm Pulls Malicious Package that Stole Login PasswordsAuthor: Ionut IlascuDate: August 21st, 2019 Excerpt: “A malicious package was removed today from the npm repository after it was discovered that it stole login information from the computers it was installed on.  The npm repository is a popular online database for open-source packages that are often used as dependencies in Node.js projects. Critical severity. Earlier today, npm pulled the package ‘bb-builder’ from the repository, marking it as malicious and having critical severity.” ——- Identifying Evasive Threats Hiding Inside the NetworkAuthor: Matt LockDate: August 22nd, 2019 Excerpt:“There is no greater security risk to an organization than a threat actor that knows how to operate under the radar.  Malicious insiders and external cybercriminals are getting savvier. They are better at blending in without tripping any alerts. They skip over tools and techniques that trigger standard security systems. How can a company tell them apart from the noise created by legitimate logins to the network that day?  The answer lies in context. It is not enough to monitor and log activity throughout the network – organizations need to be able to combine multiple sources of data to spot the subtle signs of a stealthy attacker at work.” ——- The Cost of Dealing With a Cybersecurity Attack in These 4 IndustriesAuthor: Pierluigi PaganiniDate: August 21st, 2019 Excerpt:“A cybersecurity issue can cause unexpected costs in several different areas. In addition to the monetary costs associated with things like lost productivity and improving network security to reduce the likelihood of future incidents, affected companies have to deal with the costs tied to reduced customer trust and damaged reputations.  It’s not always easy or straightforward to pinpoint the overall costs of recovering from a cyberattack. The totals also vary by industry. However, here’s some research that illuminates the various financial impacts for these four sectors. 1. Health Care, 2. Retail, 3. Manufacturing, 4. Finance.” ——- Update Now! Microsoft Patches Its Android RDP App to Fix FlawAuthor: John E DunnDate: August 22nd, 2019 Excerpt: “Microsoft has added its Android Remote Desktop Protocol (RDP) app to the list of client software that needs updating to fix a security flaw first made public as part of July’s Patch Tuesday.  The flaw, tracked as CVE-2019-1108, was described as an information disclosure issue that could allow an attacker “to connect remotely to an affected system and run a specially crafted application.”  Although the rating made it sound less urgent, attackers are known to be very interested in RDP weaknesses, hence Microsoft’s caution that that exploitation was “more likely.” The fix? To apply the relevant patch for the Windows version in question (KB4507453 in the case of Windows 10 64-bit version 1903).” ——- Here are this week’s noteworthy security bulletins (in no particular order): 1. ESB-2019.3212 – [Cisco] Cisco Systems & Cisco UCS Direct: Multiple vulnerabilities“CVE-2019-1936 …authenticated, remote attacker to execute arbitrary commands on the underlying Linux shell as the root user” 2. ESB-2019.3208 – [Appliance] IBM Netezza Host Management: Multiple vulnerabilities“CVE-2019-10161 …obtain arbitrary file information, cause a denial of service or execute arbitrary programs withroot privileges.” 3. ESB-2019.3210 – [Win][Linux][AIX] IBM InfoSphere Optim High Performance Unload: Root Compromise – Existing Account“CVE-2019-4447 …low privilege user full access to root…” 4. ESB-2019.3190 – [UNIX/Linux][Ubuntu] Zstandard: Multiple vulnerabilities“CVE-2019-11922 …execute arbitrary code if it received specially crafted input…” 5. ESB-2019.3189 – [Ubuntu] OpenJPEG: Multiple vulnerabilities“CVE-2017-17480 Certain PGX files could possibly cause a denial of service or possibly remote code execution.” Wishing you the best from AUSCERT and hope to see you safe next week,Geoffroy

Learn more