Week in review

AUSCERT Week in Review for 16th November 2018

AUSCERT Week in Review for 16th November 2018 Greetings, This week the steady flow of speculative execution attacks continues, with researchers releasing 7 additions to the vulnerability family (thankfully some are covered by previous mitigations). In good news for the international community, Mozilla’s Firefox Monitor, which checks your email addresses against Troy Hunt’s Have I Been Pwned platform, is now multilingual! Firefox Quantum will also begin displaying alerts on pages which have suffered a data breach in the last 12 months. This should go a long way to increasing user-visibility of such events, especially for those sites which have to be dragged kicking and screaming to proper user notification. In further good news, Ubuntu is putting the L in LTS, as 18.04 will be receiving 10 years of support. Recognising that IoT, scientific, and industrial devices traditionally have service lives far greater than the OSes that power them, Ubuntu is doing its best to keep our increasingly networked ecosystem from becoming an unsecurable mess (moreso than it already is). Lastly, we were once again reminded that BGP is not a secure routing protocol, in the form of a Nigerian ISP rerouting Google (and other) traffic through itself via Russia and China, seemingly by accident. The advertised routes were not prepared to handle the volume of traffic, resulting in a DoS to Google services for over an hour. Here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week: Spectre, Meltdown researchers unveil 7 more speculative execution attacksDate: 14 Novemberhttps://arstechnica.com/gadgets/2018/11/spectre-meltdown-researchers-unveil-7-more-speculative-execution-attacks/ Author: Peter BrightExcerpt: “A research team—including many of the original researchers behind Meltdown, Spectre, and the related Foreshadow and BranchScope attacks—has published a new paper disclosing yet more attacks in the Spectre and Meltdown families. The result? Seven new possible attacks. Some are mitigated by known mitigation techniques, but others are not. That means further work is required to safeguard vulnerable systems.” —— Microsoft closes actively exploited Windows zero-dayDate: 14 Novemberhttps://www.itnews.com.au/news/microsoft-closes-actively-exploited-windows-zero-day-515531 Author: Juha SaarinenExcerpt: “Admins and Windows users have been urged to apply the November 2018 round of security patches urgently, to close off vulnerabilities, one of which is under active exploitation currently. This is the Kaspersky Labs-reported CVE-2018-8589 vulnerability in the win32k.sys kernel, a privilege elevation bug that allows attackers to run arbitrary code in the local system security context, Microsoft warned.” —— Firefox Monitor Launches in 26 Languages and Adds New Desktop Browser FeatureDate: 14 Novemberhttps://blog.mozilla.org/blog/2018/11/14/firefox-monitor-launches-in-26-languages-and-adds-new-desktop-browser-feature/ Author: Nick NguyenExcerpt: “Introducing Firefox Monitor Notifications Along with making Monitor available in multiple languages, today we’re also releasing a new feature exclusively for Firefox users. Specifically, we are adding a notification to our Firefox Quantum browser that alerts desktop users when they visit a site that has had a recently reported data breach. We’re bringing this functionality to Firefox users in recognition of the growing interest in these types of privacy- and security-centric features. This new functionality will gradually roll out to Firefox users over the coming weeks.” —— Cloudflare launches Android and iOS apps for its 1.1.1.1 serviceDate: 11 Novemberhttps://www.zdnet.com/article/cloudflare-launches-android-and-ios-apps-for-its-1-1-1-1-service/ Author: Catalin CimpanuExcerpt: “Cloudflare launched today official mobile apps for its 1.1.1.1 privacy-first DNS resolver service. Mobile apps for Android and iOS are now available on their respective app stores. The company first launched the 1.1.1.1 service to great fanfare on April 1, earlier this year. The service is a basic DNS server, but one for which Cloudflare has guaranteed user privacy and improved look-up speed.” —— How a Nigerian ISP Accidentally Knocked Google OfflineDate: 15 Novemberhttps://blog.cloudflare.com/how-a-nigerian-isp-knocked-google-offline/ Author: Tom PasekaExcerpt: “Last Monday evening – 12 November 2018 – Google and a number of other services experienced a 74 minute outage. It’s not the first time this has happened; and while there might be a temptation to assume that bad actors are at work, incidents like this only serve to demonstrate just how much frailty is involved in how packets get from one point on the Internet to another.” —— Mark Shuttleworth reveals Ubuntu 18.04 will get a 10-year support lifespanDate: 15 Novemberhttps://www.zdnet.com/article/mark-shuttleworth-reveals-ubuntu-18-04-will-get-a-10-year-support-lifespan/Author: Steven J. Vaughan-NicholsExcerpt: “‘I’m delighted to announce that Ubuntu 18.04 will be supported for a full 10 years,’ said Shuttleworth, ‘In part because of the very long time horizons in some of industries like financial services and telecommunications but also from IoT where manufacturing lines for example are being deployed that will be in production for at least a decade.'” —— Here are this week’s noteworthy security bulletins: ASB-2018.0288 – [Win] Microsoft Windows: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/71754 Patch Tuesday brings with it the usual slew of vulnerability fixes. ESB-2018.3542 – [Win][Linux][Ubuntu] gettext: Execute arbitrary code/commands – Remote with user interactionhttps://portal.auscert.org.au/bulletins/71698 Maliciously formatted messages could cause RCE in GNU internationalisation package gettext. ESB-2018.3535 – [Virtual] VMware ESXi, Workstation and Fusion: Execute arbitrary code/commands – Existing accounthttps://portal.auscert.org.au/bulletins/71670 VMWare has fixed a couple of vulnerabilities, including a guest-to-host RCE. Stay safe, stay patched and have a good weekend! Tim

Learn more

Week in review

AUSCERT Week in Review for 9th November 2018

AUSCERT Week in Review for 9th November 2018 Greetings, This week in information security: a research paper has unveiled several techniques for defeating hardware-level SSD encryption, a proposal would give SA Police the right to compel you to access your devices, and Cisco have removed more hard-coded credentials. If you like the Week in Review, the AUSCERT Daily Intelligence Report is a daily news summary, in the same vein but simpler and – dare I say – prettier. It’s currently in beta. If you’d like to sign up, please email auscert@auscert.org.au. Flaws in Popular SSD Drives Bypass Hardware Disk EncryptionDate: 5 NovemberAuthor: Lawrence Abramshttps://www.bleepingcomputer.com/news/security/flaws-in-popular-ssd-drives-bypass-hardware-disk-encryption/Excerpt: “We have analyzed the hardware full-disk encryption of several SSDs by reverse engineering their firmware,” stated the report. “In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many hardware implementations have critical security weaknesses, for many models allowing for complete recovery of the data without knowledge of any secret.”To make matters worse, as Windows’ BitLocker software encryption will default to hard drive encryption if supported, it can be bypassed using the same discovered flaws. South Australia Police to be able to compel passwords and biometrics from suspectsDate: 8 NovemberAuthor: Chris Ducketthttps://www.zdnet.com/article/south-australia-police-to-be-able-to-compel-passwords-and-biometrics-from-suspects/Excerpt: “South Australia Police is set for a boost to its powers under proposed laws introduced on Thursday in Adelaide, which would enable police officers to compel passwords and biometrics from suspects.That can include the provision of passwords, fingerprints, facial scans, or retinal scans — whatever enables authorities to access a device that may contain evidence of a serious offence.“Anyone who fails to comply with the order could face up to five years imprisonment.” Govt adds new safeguards to My Health RecordDate: 7 NovemberAuthor: iTnewshttps://www.itnews.com.au/news/govt-adds-new-safeguards-to-my-health-record-515206Excerpt: The federal government has moved to introduce extra privacy and security changes to the legislation behind the controversial My Health Record just a week out from the end of the opt-out period.The proposed amendments are focused on introducing tougher penalties for system misuse, including by employers, as well as strengthening provisions to safeguard against domestic violence.They add to the August changes to privacy provisions to make it harder for agencies and police to gain access to the content of a personal electronic health record and allow individuals to delete records permanently at any time. Defence shipbuilder Austal hit by cyber security breach and extortion attemptDate: 2 NovemberAuthor: ABChttps://www.abc.net.au/news/2018-11-01/defence-shipbuilder-austal-subject-of-a-cyber-security-breach/10458042Excerpt: Western Australia-based Defence shipbuilder Austal has been the subject of a cyber security breach and extortion attempt.The company announced to the stock exchange last night that its Australian data management system had been targeted by an “unknown offender”.Some staff email addresses and mobile phone numbers were accessed, according to the statement which acknowledged that a “small number” of customers had been affected.The company, which builds patrol vessels and frigates for the Australian Navy, said there was “no evidence to date that information affecting national security has been stolen”.But it indicated the hackers got access to — or stole — drawings and designs of its ships. Stealing Chrome cookies without a passwordDate: 26 SeptemberAuthor: the hacker known as “Alex”https://mango.pdf.zone/stealing-chrome-cookies-without-a-passwordExcerpt: Chrome stores your cookies, history, deepest secrets, etc. in a user-data-dir. By default (if you have no Chrome Profiles), this will be $HOME/Library/Application Support/Google/Chrome/.Needless to say, this directory is The Good Stuff, and we want to be extremely up in it. [AUSCERT adds: this is less serious than the other articles, but a high-quality writeup of an attack.] Noteworthy bulletins this week: 1. ESB-2018.3504 – ALERT [Cisco] Cisco Unity Express: Root compromise – Remote/unauthenticatedhttps://portal.auscert.org.au/bulletins/71538 Unsafe object deserialisation strikes again.  2. ESB-2018.3484.2 – UPDATE [Win][Linux][Solaris][AIX] IBM Db2: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/71458 A grab-bag of vulnerabilities in IBM Db2, including an authenticated root compromise via symlink.  3. ESB-2018.3479 – [Linux][Ubuntu] SpamAssassin: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/71438 SpamAssassin, which is designed to handle baddies entering your mail system, has a couple of RCEs from crafted input. 4. ESB-2018.3410.4 – UPDATED ALERT [Appliance] Cisco Adaptive Security Appliance Software and Cisco Firepower Software: Denial of service – Remote/unauthenticatedhttps://portal.auscert.org.au/bulletins/71146 Noteworthy updates to the DoS vulnerability in Cisco firewalls via SIP: v9.4 has a fix, v9.6 onwards are still pending, clearer instructions on disabling SIP. 5. ESB-2018.3501 – [Cisco] Cisco Small Business Switches: Unauthorised access – Remote/unauthenticatedhttps://portal.auscert.org.au/bulletins/71526 The seventh backdoor account removed this year. Stay patched, stay safe, and have a good weekend!David

Learn more

Week in review

AUSCERT Week in Review for 26th October 2018

AUSCERT Week in Review for 26th October 2018 Greetings, Yet another week comes to a close. Between El Nino predictions for the summer and Halloween approaching, there are plenty of reasons to be scared. Not infosec professionals, however, who face hot conditions and scary situations on a daily basis! Let’s take a look at some of the creepy stuff out there this week… ….Here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week: Hacker Discloses New Windows Zero-Day Exploit On Twitter Date Published: 23/10/2018 Author: Swati Khandelwal Excerpt: “A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released another proof-of-concept exploit for a new Windows zero-day vulnerability.  SandboxEscaper posted a link to a Github page hosting a proof-of-concept (PoC) exploit for the vulnerability that appears to be a privilege escalation flaw residing in Microsoft Data Sharing (dssvc.dll).  The Data Sharing Service is a local service that runs as LocalSystem account with extensive privileges and provides data brokering between applications.  The flaw could allow a low-privileged attacker to elevate their privileges on a target system, though the PoC exploit code (deletebug.exe) released by the researcher only allows a low privileged user to delete critical system files—that otherwise would only be possible via admin level privileges.” —– IF YOUR TOOTHBRUSH CALLS YOU, IT MIGHT NOT BE FOR DENTAL HYGIENE: THE IMPORTANCE OF SECURING THE INTERNET OF THINGS Date Published: 25/10/2018 Author: Europol Excerpt: “THE MAIN CONCLUSIONS OF THE CONFERENCE ARE: security should not be an afterthought when designing systems and IoT systems are no exception; implementing security does not need to be complicated. As ENISA’s report shows, baseline security recommendations for IoT were made accessible via an interactive online table. This allows for easy access to specific good practices; law enforcement needs to be in a position to go beyond defence and incident response by being able to investigate and prosecute the criminals abusing connected devices; there is a need to discuss digital forensics in regard to IoT and the importance of data and privacy protection, considering the amount and different categories of data collected by the IoT; this joint conference is an excellent example of much-needed multi-disciplinary dialogues. ENISA and Europol are working closely together to inform key stakeholders of the need to be aware of the cybersecurity and criminal aspects associated with deploying and using these devices; the IoT has great potential and provides tremendous opportunities to improve the way we interact, do business and go about our daily lives. In 2019 and beyond, holistic, pragmatic, practical and economically viable security solutions need to be promoted and the entire IoT ecosystem needs to be looked into. ENISA will be working on an automotive IoT case study and welcomes the active support of all partners. Cybersecurity is a shared responsibility. Stronger collaborations with industry are planned together with other initiatives to ensure coordinated efforts and explore all possible synergies.” —– Is nowhere private? Chinese subway users upset by plans to install facial recognition systems Date Published: 25/10/2018 Author: Phoebe Zhang Excerpt: “The technology will be used in just one security channel at each of the four stations in Guangzhou, the capital of Guangdong province, the city’s metro operator said on Weibo, China’s Twitter-like service. To use the new channels, passengers must first register their details, including a photograph, using the Guangzhou Metro’s official smartphone app. “The registration process is voluntary,” the company said. “[And] information collected will be used only for security checks and not be passed on to our partner companies.” Once registered, passengers will be able to use through the dedicated channels and the system will recognise them from the information they registered, it said.” —– Advertisers can track users across the Internet via TLS Session Resumption Date Published: 23/10/2018 Author: Catalin Cimpanu Excerpt: “The abused TLS mechanism is called TLS Session Resumption (RFC 8447), a mechanism that was created in the mid-2000s to allow TLS servers to remember past user sessions and avoid wasting server resources by re-negotiating a TLS connection with a returning user. There are currently three different ways that servers can opt to use and support TLS Session Resumption. There’s TLS Session Resumption via session IDs, there’s TLS Session Resumption via session tickets, and there’s TLS Session Resumption via pre-shared keys (PSKs). The first two are compatible with the older TLS 1.2 protocol, while the third mechanism was developed for the newer and recently-approved TLS 1.3 standard. In all three cases, server owners have the liberty to set the lifespan the server remembers a user session.” —- Apps Installed On Millions Of Android Phones Tracked User Behavior To Execute A Multimillion-Dollar Ad Fraud Scheme Date Published: 23/10/2018 Authors: Craig Silverman Excerpt: “The Google Play store pages for these apps were soon changed to list four different companies as their developers, with addresses in Bulgaria, Cyprus, and Russia, giving the appearance that the apps now had different owners. But an investigation by BuzzFeed News reveals that these seemingly separate apps and companies are today part of a massive, sophisticated digital advertising fraud scheme involving more than 125 Android apps and websites connected to a network of front and shell companies in Cyprus, Malta, British Virgin Islands, Croatia, Bulgaria, and elsewhere. More than a dozen of the affected apps are targeted at kids or teens, and a person involved in the scheme estimates it has stolen hundreds of millions of dollars from brands whose ads were shown to bots instead of actual humans.” — Magecart hackers change tactic and target vulnerable Magento extensions Date Published: 24/10/2018 Authors: Pierluigi Paganini Excerpt: “The new attack was detailed by the researcher Willem de Groot, the hackers are now exploiting zero-day vulnerabilities in popular store extension software in order to inject skimmer scripts. “Online credit card theft has been all over the news: criminals inject hidden card stealers on legitimate checkout pages. But how are they are able to inject anything in the first place? As it turns out, thieves are massively exploiting unpublished security flaws (aka 0days) in popular store extension software.” continues the expert. “While the extensions differ, the attack method is the same: PHP Object Injection (POI). Now attackers leverage PHP Object Injection (POI) by abusing PHP’s unserialize() function in order to compromise websites. With this attack method, they are able to modify the database or any JavaScript file. According to de Groot, many popular PHP applications continue to use unserialize(), but while Magento has replaced most of the vulnerable functions, many of its extensions are still flawed. “This attack vector abuses PHP’s unserialize() function to inject their own PHP code into the site.” continues the researcher.” Here are this week’s noteworthy security bulletins: 1) ESB-2018.3290 – [Juniper] Juniper Junos OS: Execute arbitrary code/commands – Remote/unauthenticated Juniper Network released a security update for the Junos OS, used in its physical and virtual networking and security products.  The update addressed a vulnerability arising from the mishandling of crafted BGP NOTIFICATION messages. It can cause a denial of service and condition and potentially lead to remote code execution. 2) ASB-2018.0241.2 – UPDATE Palo Alto PAN-OS: Multiple vulnerabilities Not to be outdone, Palo Alto Networks fixed a few issues affecting the OpenSSL library used in its Pan-OS operating system, which is used in a large number of Juniper’s network appliances. The worst of these three vulnerabilities could lead to the disclosure of privileged information. 3) ASB-2018.0271 – [Win][UNIX/Linux] Tenable Nessus: Multiple vulnerabilities Tenable’s Nessus received an update that fixes two vulnerabilities stemming from the OpenSSL library it employs. The more serious of the two could allow a remote attacker to infer the private key generated by the RSA key generation algorithm via a cache timing side channel attack. This would lead to the decryption of “secure“ communications. 4) ASB-2018.0270.2 – UPDATED ALERT [Win][UNIX/Linux][Android] Mozilla Firefox and Mozilla Firefox ESR: Multiple vulnerabilities Mozilla released an update that addressed a large number of vulnerabilities in Firefox and Firefox ESR. The worst of these leads to remote code execution. Stay safe, stay patched, stay cool and have a good weekend! Nicholas

Learn more

Week in review

AUSCERT Week in Review for 2nd November 2018

AUSCERT Week in Review for 2nd November 2018 Greetings, As another week comes to a close, here’s a collection of articles for you to enjoy. Been having nightmares lately? May there’s a hacker behind it… Here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week: Hackers attacking your memories: science fiction or future threat? Date Published: 29/10/2018 Author: Kaspersky Lab Excerpt: “The hardware and software to underpin this exists too: deep brain stimulation (DBS) is a neurosurgical procedure that involves implanting a medical device called a neurostimulator or implantable pulse generator (IPG) in the human body to send electrical impulses, through implanted electrodes, to specific targets in the brain for the treatment of movement and neuropsychiatric disorders. It is not a huge leap for these devices to become ‘memory prostheses’ since memories are also created by neurological activity in the brain.   To better understand the potential future threat landscape facing memory implants, researchers from Kaspersky Lab and the University of Oxford Functional Neurosurgery Group have undertaken a practical and theoretical threat review of existing neurostimulators and their supporting infrastructure.   The attached report is the outcome of that research. It should be noted that because much of the work involving neurostimulators is currently handled in medical research laboratories, it’s not easy to practically test the technology and associated software for vulnerabilities. However, much can be learned from handling the devices and seeing them used in situ, and this research involved both.” —- Project Dribble: hacking Wi-Fi with cached JavaScript Date Published: 29/10/2018 Author: Federico De Meo Excerpt: “The idea is to steal Wi-Fi passwords by exploiting web browser’s cache. Since I needed to come up with a name for the project, I first developed it and than named it “Dribble” :-). Dribble creates a fake Wi-Fi access point and waits for clients to connect to it. When clients connect, dribble intercepts every HTTP requests performed to JavaScript pages and injects in the responses a malicious JavaScript code. The headers of the new response are altered too so that the malicious JavaScript code is cached and forced to persist in the browser. When the client disconnects from the fake access point and reconnects back to, say, its home routers, the malicious JavaScript code activates, steals the Wi-Fi password from the router and send it back to the attacker. Pretty straightforward, right?   In order to achieve this result I had to figure out these three things: How to create a fake access point How to force people to connect to it What should the malicious JavaScript code do to steal passwords from routers” —– Apple’s new security chip kills access to microphone Date Published: 30/10/2018 Author: Greg Otto Excerpt: “In a security pamphlet released after Apple’s press event on Tuesday, the company revealed that the chip will completely cut off access to the device’s microphone when the MacBook lid is shut. “This disconnect is implemented in hardware alone, and therefore prevents any software, even with root or kernel privileges in macOS, and even the software on the T2 chip, from engaging the microphone when the lid is closed,” the pamphlet reads. The power cut is only limited to the microphone, and not the camera, since the latter would be useless when a computer is shut. The T2 chips are in the latest line of MacBook Pros, and will be in included in the new MacBook Airs and Mac Minis.” —– Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims Date Published: 31/10/2018 Author: David Bisson Excerpt: “At this current time, Kraken employs a ransomware-as-a-service (RaaS) business model. The first version of the threat reserved a quarter of the profits generated from attack campaigns for Kraken’s developers. But that percentage dropped to a fifth in the second version, presumably in a bid to attract more affiliates. According to McAfee, the developers give affiliates an updated version of the ransomware every 15 days to ensure that their creation avoids detection. Affiliates then spread the ransomware with the help of Fallout and other vectors. Upon successful infection, Kraken quickly encrypts data on the disk and uses SDelete from the Sysinternals suite along with other tools to wipe files and complicate the recovery process for the user. It then drops a ransom note on the infected computer asking victims to send money to one of several wallets operated by the attackers through BitcoinPenguin, an online gambling site.” —– Same Old yet Brand-new: New File Types Emerge in Malware Spam Attachments Date Published: 29/10/2018 Author: Trend Micro Excerpt: ” We recently found a small spam campaign that distributes malicious .ARJ files. Several of these spam emails have email subjects pertaining to statements or purchase orders, such as “STATEMENT OF OUTSTANDING BALANCE AS YOUR REFERENCE,” “New Order-Snam Thai Son Group//PO//Ref 456789,” and “SUBJECT:Advice from Standard Chartered Bank,” to name a few. After the malicious .ARJ file has been downloaded to a device, it may drop and execute a plain executable file or an executable screensaver file. Back in 2014, once successfully unpacked in a system, a spam campaign with an .ARJ file attachment will turn an infected computer as part of a botnet that can be used for spam or denial-of-service attacks. This year, the payload is a spyware (detected by Trend Micro as TROJANSPY.WIN32.GOLROTED.THAOOEAH) that steals system information as well as usernames and passwords from browsers. This malware also attempts to steal stored email credentials from several email service platforms. Cybercriminals also use .Z files maliciously. .Z file extensions are compressed Unix-based machine files, though it has been outshined by the GNU Gzip compression in terms of popularity among users. Because it appears to have a double file extension (such as .PDF.z), users may be tricked into thinking that they’re opening a PDF instead of a .Z file.” Here are this week’s noteworthy security bulletins: 1) ESB-2018.3432 – ALERT [Cisco] Cisco Aironet Access Points and Meraki Access Points: Execute arbitrary code/commands – Remote/unauthenticated Cisco issued firmware updates for its Aironet and Meraki Access Points. The update addresses a critical vulnerability in the vulnerability in the Bluetooth Low Energy (BLE) Stack on Texas Instruments (TI) chips CC2640 and CC2650. Processing malformed BLE frames could lead to a memory corruption condition resulting in Denial of service or Remote code execution. An attacker would need to be network adjacent to exploit the vulnerability. The implications here are huge, so super urgent patching is highly recommended. 2) ESB-2018.3410 – [Appliance] Cisco Adaptive Security Appliance Software and Cisco Firepower Software: Denial of service – Remote/unauthenticated Software for Cisco’s Adaptive Security Appliance (ASA) and Firepower platforms received a security update fixing a denial of service vulnerability that could be remotely exploited by flooding an affected device with crafted SIP traffic. Exploits have been sighted in the wild, so fix it ASAP! 3) ASB-2018.0275 – [Win][UNIX/Linux][BSD][Android] Mozilla Thunderbird: Multiple vulnerabilities Mozilla Thunderbird ESR received an update that fixes multiple vulnerabilities. The most serious of these could result in remote code execution by tricking users into performing certain actions.   4) ESB-2018.3336 – [Win] Cisco Advanced Malware Protection: Execute arbitrary code/commands – Existing account Cisco released an update for its Advanced Malware Protection solution on Windows platforms. The fixed vulnerability could allow a highly privileged attacker to prevent detection of malicious intrusions in the host. As we have seen in the past, after gaining privileges in the target system, several malware types attempt to identify and kill security applications running on the infected host.   Stay safe, stay patched, stay cool and have a good weekend! Nicholas

Learn more

Week in review

AUSCERT Week in Review for 19th October 2018

AUSCERT Week in Review for 19th October 2018 AUSCERT Week in Review19 October 2018 This week’s libssh issue makes me think of the usual joke intro. of “Knock Knock! – Who’s there?”, just that the punchline is when the answer is “It’s (Me) and I’m allowed to come in.”, and the response is “Sure! come right in!”. Probably not the type of authentication challenge-response that was expected.  So, this just illustrates that access will be had even with the best intentions of rolling out trusted and secure modules. A compensating control, is assume that breaches have already been made and unwanted activity is being performed. These types of activities can be found by doing some threat hunting, just in case someone, somehow got through.  If you need to skill up on that aspect, there is a 10% discount for AUSCERT members at the “AUSTRALIAN LEADERSHIP CYBER-SECURITY WORKSHOPS”.  Tick the box that you are an AUSCERT member and you will automatically get the discount for training that will be rolled out in Canberra and in Brisbane.[1] An another note, a flurry of notices came through this morning about the specific patch instructions, from SUSE for SUSE Linux Enterprise Server 12-SP2-BCL.  [1] https://www.eait.uq.edu.au/australian-leadership-cyber-security-workshops  As for the news, here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week:  ——- Title:  Critical Remote Code Execution Vulnerabilities Patched by DrupalURL:    https://news.softpedia.com/news/critical-remote-code-execution-vulnerabilities-patched-by-drupal-523315.shtmlDate:   October 18, 2018Author: Sergiu Gatlan Excerpt:“… Unpatched versions of the Drupal open source content management system (CMS) are vulnerable to remote exploitation which could lead to remote code execution.Given enough privileges associated with the user that the Drupal installation runs under, this could allow bad actors to create new accounts with full users rights, as well as view, change, delete data on the compromised target.Therefore, compromised servers where Drupal is launched using a user with limited rights will be a lot less impacted than those where Drupal runs under an administrator account.” ——- Title:  New Reconnaissance Tool Uses Code from Eight-Year-Old Comment Crew ImplantURL:    https://www.bleepingcomputer.com/news/security/new-reconnaissance-tool-uses-code-from-eight-year-old-comment-crew-implant/Date:   October 18, 2018Author: Ionut Ilascu Excerpt:“A newly discovered first-stage implant targeting Korean-speaking victims borrows code from another reconnaissance tool linked to Comment Crew, a Chinese nation-state threat actor that was exposed in 2013 following cyber espionage campaigns against the United States.Dubbed Oceansalt, the threat has been spotted on machines in South Korea, the United States, and Canada.” ——- Title:  Critical Vulnerabilities Allow Takeover of D-Link RoutersURL:    https://www.securityweek.com/critical-vulnerabilities-allow-takeover-d-link-routersDate:   October 17, 2018Author: Eduard Kovacs Excerpt:“The security holes affecting D-Link devices were discovered by a research team at the Silesian University of Technology in Poland. The bugs impact the httpd server of several D-Link routers, including DWR-116, DWR-111, DIR-140L, DIR-640L, DWR-512, DWR-712, DWR-912, and DWR-921.One of the vulnerabilities, tracked as CVE-2018-10822, is a directory traversal issue that allows remote attackers to read arbitrary files using a simple HTTP request. The vulnerability was previously reported to D-Link and tracked as CVE-2017-6190, but the vendor failed to address it in many of its products.” ——- Title:  Hacker: I’m logged in. New LibSSH Vulnerability: OK! I believe youURL:    https://www.bleepingcomputer.com/news/security/hacker-im-logged-in-new-libssh-vulnerability-ok-i-believe-you/Date:   October 17, 2018Author: Ionut Ilascu Excerpt:“Discovered by Peter Winter-Smith of NCC Group, the vulnerability received the identification number CVE-2018-10933 and it affects the server part of libssh.Laughably easy to exploit is an understatementLeveraging it is a simple matter of presenting the server with the  SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem.The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.” ——- Title:  Apple VoiceOver iOS vulnerability permits hacker access to user photosURL:   https://www.zdnet.com/article/apple-voiceover-iphone-vulnerability-permits-access-to-user-photos/Date:   October 15, 2018Author: Charlie Osborne Excerpt:“A vulnerability has been discovered in the Apple iOS VoiceOver feature which can be exploited by attackers to gain access to a victim’s photos.As reported by Apple Insider, the bug, a lock screen bypass made possible via the VoiceOver screen reader, relies on an attacker having physical access to the target device.Revealed by iOS hacker Jose Rodriguez and subsequently demonstrated in the YouTube video below, the attack chain begins with the attacker calling the victim’s phone.” ——- And lastly, here are this week’s noteworthy security bulletins (in no particular order): 1) ESB-2018.3113 – [SUSE] texlive: Execute arbitrary code/commands – Remote with user interactionhttps://portal.auscert.org.au/bulletins/69822Load a font, execute code. (CVE-2018-17182) 2) ASB-2018.0266 – [Win][UNIX/Linux] Google Chrome: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/70182Chrome 70 is out. 3) ESB-2018.3183 – [Debian] drupal7: Execute arbitrary code/commands – Existing accounthttps://portal.auscert.org.au/bulletins/70202…executing arbitrary code. 4) ESB-2018.3191 – [SUSE] linux kernel: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/70242…escalating privileges in kernel. 5) ESB-2018.3188 – [SUSE] xen: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/70230…hypervisor crash or potentially privilege escalation Wishing you the best from AUSCERT and stay safe as we will need you next week to keep users safe,Geoffroy

Learn more

Blogs

What Scotty Didn't Know – your guide to domain takeovers

What Scotty Didn't Know – your guide to domain takeovers Last night, a domain belonging to our PM lapsed, resulting in a cheeky citizen snapping it up [1]. If your business lost control of its domain, what would you do? Losing your domain can greatly impact business operations – email will stop working, customers won’t be able to access your website, soon calls and tweets start coming in. In a worst case scenario, someone with malicious intent can claim the domain, start receiving sensitive business emails, receive password reset emails for online services, and start sending emails as you. Not only does this look unprofessional, but can significantly impact service to your clients, your access to other services (via email password resets), and impact business revenue. Fortunately, prevention is as simple as not letting the renewal get lost in a sea of tasks: – See if your registrar allows automatic renewal, and make sure your payment details are kept up to date– Set an alert far enough in advance to get the expense approved and paid– Don’t ignore emails from your registrar, but also don’t click links in the email. It is always safer to go directly to their website– Related to the previous point, watch out for scam emails claiming to be from a registrar. They often use urgent wording to try get you to click ICANN is the Internet Corporation for Assigned Names and Numbers. They control generic top level domains (gTLD) such as .com, .net, .space. The number of gTLDs is expanding, but there are currently over 1900 that have been delegated. ICANN policy allows a 30 day redemption grace period where the registered name holder can renew a lapsed gTLD. The .au TLD is a country code top level domain (ccTLD). In Australia, the .au top level domain, which includes .com.au, .gov.au, .net.au, .edu.au, is controlled by auDA – .au Domain Administration Ltd [2]. auDA’s domain name renewal policy for lapsed domains is also 30 calendar days after expiry. Conveniently, for potential scammers, there is a public list of expired domain names, updated daily. [3] If someone has taken your .au domain and is trying to sell it back to you, this is called cybersquatting, and not allowed according to auDA’s policies:“A registrant may not register a domain name for the sole purpose of resale or transfer to another entity.” [4]In this scenario, you would be able to file a complaint with auDA.   Registering similar domains So you have awesomebusiness.com.au … but what if someone buys awesomebusiness.com? Or awesomebusiness.tk? Domains are fairly cheap, so it often doesn’t hurt to buy the more common ones, like .com or .net If you follow this route, try not to let them lapse as well! If someone does register a domain that infringes on your trademark, it may be possible to have it de-registered. We recommend speaking with your legal department for advice. AUSCERT is only able to issue takedowns for malicious domains that are used to distribute malware or phishing campaigns. Subdomain takeoversIt would be remiss to have a post about domains but not mention subdomain takeovers. This often occurs when CNAME records aren’t kept up to date. For example, say you have campaign.awesomebusiness.com.au which points to hosting.cloud.com. After the campaign ends you take down the site, but forget remove the CNAME record. This would allow someone else to establish a service on hosting.cloud.com, and set up a phishing site for your users at campaign.awesomebusiness.com.au. To prevent this, include updating DNS in your decommissioning process, and periodically check your DNS zone file. While domain threats are not often at the forefront of our minds, a little bit of housekeeping can go a long way to prevent an embarrassing incident in the future. Charelle. [1] https://web.archive.org/web/20181018222134/http://www.scottmorrison.com.au/[2] https://www.auda.org.au/[3] https://afilias.com.au/about-au/domain-drop-lists[4] https://www.auda.org.au/policies/index-of-published-policies/2012/2012-04/

Learn more

Week in review

AUSCERT Week in Review for 12th October 2018

AUSCERT Week in Review for 12th October 2018 AUSCERT Week in Review12 October 2018 Greetings,“Thar’s money in them thar breaches!”. [1]Well, it turns out that when playing a probability’s game, the more time you play at it, the more chances of hitting the Jackpot. This time it was 500K users on Google+, which the business risk model seems to have ridden on the acceptance of closing up shop if the numbers come up. It would be interesting to see if there will be any persistent repercussions from Europe and its GDPR [2].  The question of whether it a “less severe breach” or “more severe breach” [3] may be pivotal as this may impact yearly earnings and in turn stock prices [4]. The ripple effect can be seen to go well beyond the data centers and endpoints we are tasked to secure. There’s money to be made in breaches, for sure, but not as may be expected.  GDPR vs Google, may pan out to be an event that two continents will have to smooth out. [1] http://dlg.galileo.usg.edu/dahlonega/history.php[2] https://www.gdpreu.org/compliance/fines-and-penalties/[3] https://www.nibusinessinfo.co.uk/content/gdpr-penalties-and-enforcement[4] https://www.marketwatch.com/investing/stock/goog As for the news, here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week:  ——- Title:  PoC Code Available For Microsoft Edge Remote Code Execution BugURL:    https://www.bleepingcomputer.com/news/security/poc-code-available-for-microsoft-edge-remote-code-execution-bug/Date:   October, 11 2018Author: Ionut Ilascu Excerpt:“The flurry of security bugs Microsoft addressed with this month’s rollout of updates includes a remote code execution vulnerability in Edge web browser. The glitch relies on abusing URI schemes and scripts in Windows that can run with user-defined parameters.Now tracked as CVE-2018-8495, the bug was discovered by security researcher Abdulrahman Al-Qabandi.His investigation started from the simple response to the ‘mailto’ URI scheme in Microsoft Edge when he noticed that Outlook would launch with a parameter customized for the scenario at hand.” ——- Title:  World’s largest CCTV maker leaves at least 9 million cameras open to public viewingURL:    https://www.theregister.co.uk/2018/10/09/xiongmai_cctv_failDate:   October, 9 2018Author: Shaun Nichols Excerpt:“This time, it’s Chinese surveillance camera maker Xiongmai named and shamed this week by researchers with SEC Consult for the poor security in the XMEye P2P Cloud service. Among the problems researchers pointed to were exposed default credentials and unsigned firmware updates that could be delivered via the service.As a result, SEC Consult warns, the cameras could be compromised to do everything from spy on their owners, to carry out botnet instructions and even to serve as an entry point for larger network intrusions.“Our recommendation is to stop using Xiongmai and Xiongmai OEM devices altogether,” SEC Consult recommended.” ——- Title:  It’s a cert: Hundreds of big sites still unprepared for starring role in that Chrome 70’s showURL:    https://www.theregister.co.uk/2018/10/09/chrome_70_symantec_cert_disavowal/Date:   October, 9 2018Author: John Leyden Excerpt:“Hundreds of high-profile websites are still unprepared for the total disavowal of legacy Symantec-issued digital certificates that will kick in with the release of Chrome 70 next week.Chrome 70, out on 16 October, will no longer recognise Symantec-issued certificates including legacy-branded Equifax, GeoTrust, RapidSSL, Thawte and VeriSign.” ——- Title:  Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users’ DataURL:    https://thehackernews.com/2018/10/google-plus-shutdown.htmlDate:   October, 8 2018Author: Swati Khandelwal Excerpt:“Google is going to shut down its social media network Google+ after the company suffered a massive data breach that exposed the private data of hundreds of thousands of Google Plus users to third-party developers.According to the tech giant, a security vulnerability in one of Google+’s People APIs allowed third-party developers to access data for more than 500,000 users, including their usernames, email addresses, occupation, date of birth, profile photos, and gender-related information.” ——- Title:  Fake Flash Updaters Push Cryptocurrency MinersURL:   https://researchcenter.paloaltonetworks.com/2018/10/unit42-fake-flash-updaters-push-cryptocurrency-miners/Date:   October, 11 2018Author: Brad Duncan Excerpt:“In most cases, fake Flash updates pushing malware are not very stealthy. In recent years, such imposters have often been poorly-disguised malware executables or script-based downloaders designed to install cryptocurrency miners, information stealers, or ransomware. If a victim runs such poorly-disguised malware on a vulnerable Windows host, no visible activity happens, unless the fake updater is pushing ransomware. However, a recent type of fake Flash update has implemented additional deception. As early as August 2018, some samples impersonating Flash updates have borrowed pop-up notifications from the official Adobe installer. These fake Flash updates install unwanted programs like an XMRig cryptocurrency miner, but this malware can also update a victim’s Flash Player to the latest version.” ——- And lastly, here are this week’s noteworthy security bulletins (in no particular order): 1) ESB-2018.3099 – [SUSE] linux kerenel: Root compromise – Existing accounthttps://portal.auscert.org.au/bulletins/69754Gaining priviledges in kernel. (CVE-2018-17182) 2) ESB-2018.3084 – [Juniper] Junos Space Network Management Platform: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/69690Leveraging on an OpenSSH vulnerability (CVE-2016-10010) 3) ESB-2018.3070 – [Appliance] Siemens ROX II: Root compromise – Existing accounthttps://portal.auscert.org.au/bulletins/69626…gain root privileges. (CVE-2018-13801) 4) ASB-2018.0238 – [Appliance] Intel Server Boards: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/69662…may allow an unauthenticated attacker to potentially execute arbitrary code resulting…(CVE-2018-12173) 5) EESB-2018.3096 – [RedHat] Red Hat Process Automation Manager: Execute arbitrary code/commands – Remote/unauthenticatedhttps://portal.auscert.org.au/bulletins/69742…Yaml unmarshalling vulnerable to RCE (CVE-2016-9606) Wishing you the best from AUSCERT and stay safe as we will need you next week to keep users safe,Geoffroy

Learn more

Week in review

AUSCERT Week in Review for 5th October 2018

AUSCERT Week in Review for 5th October 2018 Greetings, The Shearwater 2018 Hackathon is going to be held on the 16th of November in Sydney, Melbourne, Canberra, and Brisbane. It’s a one-day CTF and learning event with two different challengest and prizes to be won. There’s also a 20% discount if you use the code AUSCERT. In case you’ve missed it, the third AUSCERT and BDO Security Survey is now open. This annual survey identifies and monitors current cyber security trends, issues and threats facing businesses in Australia and New Zealand.By taking part you will gain direct access to our survey report, which contains valuable data that allows you to compare business’ current cyber security efforts with trends in your industry sector.Survey respondents have the chance to go in the draw to win one of three Apple Watches. The survey closes at midnight on Friday, 23 November 2018. The survey is anonymous and takes 15 minutes to complete. Here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week: The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. CompaniesDate Published: 04/10/2018https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companiesAuthor: Jordan Robertson, Michael Riley Excerpt: “Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.” A response from Apple: What Businessweek got wrong about Apple Date Published: 04/10/2018https://www.apple.com/newsroom/2018/10/what-businessweek-got-wrong-about-apple/Author: Apple StatementExcerpt: “The October 8, 2018 issue of Bloomberg Businessweek incorrectly reports that Apple found “malicious chips” in servers on its network in 2015. As Apple has repeatedly explained to Bloomberg reporters and editors over the past 12 months, there is no truth to these claims.” A follow up from Bloomberg: The Big Hack: The Software Side of China’s Supply Chain AttackDate Published: 04/10/2018https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-the-software-side-of-china-s-supply-chain-attackAuthor: Jordan Robertson, Michael RileyExcerpt: “In its denial that a chip attack had reached its server network, Apple did acknowledge to Bloomberg Businessweek that it had encountered malware downloaded from Supermicro’s customer portal.” Wi-Fi now has version numbers, and Wi-Fi 6 comes out next yearDate Published: 03/10/2018https://www.theverge.com/2018/10/3/17926212/wifi-6-version-numbers-announcedAuthor: Jacob KastrenakesExcerpt: “If you’ve ever bought a Wi-Fi router, you may have had to sort through specs that read like complete gibberish — like “802.11ac” or “a/b/g/n.” But going forward, Wi-Fi is adopting version numbers so that it’ll be easier to tell whether the router or device you’re buying is on the latest version.” Voice Phishing Scams Are Getting More CleverDate Published: 01/10/2018https://krebsonsecurity.com/2018/10/voice-phishing-scams-are-getting-more-clever/Author: Brian KrebsExcerpt: “Most of us have been trained to be wary of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations that put a new shine on old-fashioned telephone-based phishing scams. Think you’re too smart to fall for one? Think again: Even technology experts are getting taken in by some of the more recent schemes (or very nearly).” Everything We Know About Facebook’s Massive Security BreachDate Published: 28/09/2018https://www.wired.com/story/facebook-security-breach-50-million-accounts/Author: Louise Matsakis, Issie LapowskyExcerpt: “Facebook’s privacy problems severely escalated Friday when the social network disclosed that an unprecedented security issue, discovered September 25, impacted almost 50 million user accounts. Unlike the Cambridge Analytica scandal, in which a third-party company erroneously accessed data that a then-legitimate quiz app had siphoned up, this vulnerability allowed attackers to directly take over user accounts.” Here are this week’s noteworthy security bulletins: 1) ESB-2018.3017 – [Cisco] Cisco Identity Services Engine: Execute arbitrary code/commands – Existing account Hardcoded credentials in a Cisco device. 2) ESB-2018.2961 – [Linux][OSX] WebKitGTK+ and WPE WebKit: Multiple vulnerabilities A truckload of vulnerabilities were discovered in WebKitGTK+ and WPE WebKit. 3) ESB-2018.2966 – [UNIX/Linux][Ubuntu] haproxy: Denial of service – Remote/unauthenticated HAProxy could be made to crash if it received a specially crafted request. 4) ASB-2018.0225 – [Android] Google Android devices: Multiple vulnerabilities Multiple security vulnerabilities have been identified in the Android operating system prior to the 2018-10-05 patch level. 5) ESB-2018.2952 – ALERT [Win][Mac] Adobe Acrobat and Reader: Multiple vulnerabilities Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. Stay safe, stay patched and have a good weekend! Charelle  

Learn more

Week in review

AUSCERT Week in Review for 28th September 2018

AUSCERT Week in Review for 28th September 2018 Greetings, Another week with a crazy number of AUSCERT bulletins! 99! That is an average of 19.8 bulletins per day! The worst thing is when you see CVE numbers like CVE-2011-2767 in a 2018 bulletin, oops forgot to fix that vulnerability didn’t we? It’s really hard to see the light at the end of the tunnel sometimes…but hopefully with the continual investment in what we now call Cyber Security and better development lifecycles we’ll perhaps see the end of the proliferation of the same vulnerabilities again and again. However, does it all matter in the end when that user still clicks on that URL in that PDF to a fake OneDrive page and inputs their credentials in to a look-a-like O365 web page? Repeat after me: Multi-factor authentication is now a REQUIREMENT in 2018. It is no longer optional. Especially if Chrome goes further down the rabbit hole, and kills off all sub-domains resulting in a compromised *.sharepoint.com phishing pages looking 100% legitimate to unsuspecting users? At AUSCERT 2018, we announced a new service, the AUSCERT Daily Intelligence Report. ADIR is now in private beta. If you’re a member interested in receiving a daily summary of cybersecurity news, please contact us at auscert@auscert.org.au to subscribe. In other news the third AUSCERT and BDO Security Survey is now open.   This annual survey identifies and monitors current cyber security trends, issues and threats facing businesses in Australia and New Zealand.By taking part you will gain direct access to our survey report, which contains valuable data that allows you to compare business’ current cyber security efforts with trends in your industry sector.Survey respondents have the chance to go in the draw to win one of three Apple Watches. The survey closes at midnight on Friday, 23 November 2018. The survey is anonymous and takes 15 minutes to complete. https://bdoaustralia.checkboxonline.com/2018CSS.survey Here is a summary (including excerpts) of some of the more interesting stories we have seen this week: Title: Gone in 15 Minutes: Australia’s Phone Number Theft ProblemAuthor: BankInfoSecurityExcerpt: SIM hijacking is not a new attack, but there’s increasing interest in stealing phone numbers. That’s because banks often send two-step verification codes over SMS. Additionally, major services such as Google, LinkedIn, Facebook and Instagram use the mobile channel in some scenarios for password resets.Over the past two years, fraud involving unauthorized phone ports has increased, mostly due to organized crime, says Detective Chief Inspector Matthew Craft of the New South Wales Police’s Financial Crimes Squad. Craft says because of the mobile industry’s “inability to implement some simple measures to prevent it from occurring,” the problems have continued.—– Title: Decryption laws enter parliamentAuthor: iTnewsExcerpt: The federal government has moved to introduce the legislation underpinning its controversial crackdown on encrypted communications services.The Telecommunications and Other Legislation Amendment (Assistance and Access) Bill was introduced into parliament by home affairs minister Peter Dutton on Thursday.It comes less than two weeks after the Department of Home Affairs closed public consultation on the exposure draft of the bill, in which more than 14,000 submissions are said to have been made. —– Title: Mass WordPress compromises redirect to tech support scamsAuthor: Malwarebytes LabsExcerpt: Thousands of WordPress sites have been injected with the same malicious redirection. We review the infection details and the malicious traffic leading to browser lockers. —– Title: Uber to pay $148 million to states for 2016 data breachAuthor: CyberScoopExcerpt:  Ridehailing company Uber will pay $148 million across all 50 [American] states and Washington, D.C., as part of a settlement stemming from a data breach that revealed sensitive information on 57 million of the company’s users.The breach took place in October 2016 and revealed names, email addresses, phone numbers and U.S. driver’s license numbers. The company paid the hackers $100,000 to stay quiet and delete the data.Several attorneys general released statements after the settlement was announced, with each state getting a varying amount. —–Title: United Nations WordPress Site Exposes Thousands of ResumesAuthor: BleepingComputerExcerpt: Disclosure vulnerabilities in a web app from the United Nations leave open to public access CVs from job applicants and the organization failed to plug the leak despite receiving a private report on the issues.Security researcher Mohamed Baset of penetration testing company Seekurity found a path disclosure and an information disclosure bug in one of the UN’s WordPress websites, which gives unfettered access to job applications since 2016. He claims that thousands of documents have been uploaded. —–Here are this week’s noteworthy security bulletins: 1) ESB-2018.2842 – [UNIX/Linux][Debian] mediawiki: Multiple vulnerabilities Multiple vulnerabilities have been found in the popular Wiki. These result in incorrectly configured rate limits, information disclosure in Special:Redirect/logid and bypass of an account lock. 2) ESB-2018.2900 – [Win][UNIX/Linux] Apache HTTP Server: Denial of service – Remote/unauthenticated Apache HTTP Server is vulnerable to a Remote/Unauthenticated Denial of Service; if you value your uptime in the end a minor downtime to patch is recommended. 3) Cisco has released their 2018 Semi-annual Cisco IOS and IOS XE Software Security Advisory Bundled Publication that can be found in the three ESBs below. ESB-2018.2902 – [Cisco] Cisco IOS XE: Multiple vulnerabilitiesESB-2018.2903 – [Cisco] Cisco IOS Software: Multiple vulnerabilitiesESB-2018.2904 – [Cisco] Cisco IOS and IOS XE: Denial of service – Remote/unauthenticated Stay safe, stay patched and have a good weekend! Ananda

Learn more

Week in review

AUSCERT Week in Review for 21st September 2018

AUSCERT Week in Review for 21st September 2018 There were again numerous updates and patches released this week. While Microsoft had its turn last week with Patch Tuesday, it seems that it was Apple’s turn this week.Apple released a new version of iOS as well as fixes for Safari, Apple Watch and Apple TV. Below is a summary (including excerpts) of some of the more interestingstories we’ve seen this week: — Title: iOS 12 Patches Memory Bugs, Safari 12 Fixes Data Leaks Date Published: 17-09-2018 URL: https://www.bleepingcomputer.com/news/security/ios-12-patches-memory-bugs-safari-12-fixes-data-leaks/ Author: Ionut Ilascu Excerpts: “A new round of security updates is available from Apple, fixing bugs in Safari, watchOS, tvOS, and iOS.” “Apple released its newest version of iOS today, and apart from adding a performance boost to older iPhone models, it also comes with solutions for security problems.” — Title: Hackers Mining Cryptos Using Leaked NSA Surveillance Tools, New Report Reveals Date Published: 20-09-2018 URL: Hackers Mining Cryptos Using Leaked NSA Surveillance Tools, New Report Reveals Author: Steve Kaaru Excerpt: “The report revealed that cryptojacking incidences have spiked by over 450 percent in 2018, attributing the increased incidences to an NSA tool that was leaked in late 2017 which has been used by North Korean and Russian hackers in the past to infiltrate strategic targets. Now, the tool is being used to mine cryptos, and the hackers show no sign of slowing down with their lucrative venture.” — Title: Adobe releases patch out of schedule to squash critical code execution bug Date Published: 20-09-2018 URL: https://www.zdnet.com/article/adobe-releases-patch-out-of-schedule-to-squash-code-execution-bugs/ Author: Charlie Osborne Excerpts: “Adobe has released a patch out of the usual security update schedules to resolve a set of severe vulnerabilities in Adobe Acrobat and Reader.” “Deemed critical, CVE-2018-12848 can lead to arbitrary code execution in the context of the current user if exploited by attackers.” — Title: Western Digital goes quiet on unpatched MyCloud flaw Date Published: 20-09-2018 URL: https://nakedsecurity.sophos.com/2018/09/20/western-digital-goes-quiet-on-unpatched-mycloud-flaw/ Author: John E Dunn Excerpt: “No admin password, nothing – just a simple CGI request to MyCloud’s web server and an attacker would be in via a local network” — Title: ICO Fines Equifax £500K After 2017 Breach Date Published: 20-09-2018 URL: https://www.infosecurity-magazine.com/news/ico-fines-equifax-500k-after-2017/ Author: Phil Muncaster Excerpt: “The Information Commissioner’s Office (ICO) has issued the maximum fine possible to Equifax in response to failings which led to a major 2017 breach.” —   Here are a few of this week’s noteworthy security bulletins: ESB-2018.2832 – ALERT [Win][Mac] Adobe Acrobat and Reader: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/68614 Some recent Adobe Acrobat and Reader vulnerabilites to address.   ESB-2018.2824 – [SUSE] pango: Denial of service – Remote with user interaction https://portal.auscert.org.au/bulletins/68582 Denial of Service from parsing Emoji!   ESB-2018.2782 – [Apple iOS] Apple Support 2.4 for iOS: Access confidential data – Remote/unauthenticated https://portal.auscert.org.au/bulletins/68394 One of a number of Apple advisories released this week which included others for tvOS, watchOS and Safari.   ESB-2018.2807 – [Ubuntu] ghostscript: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/68506 Many linux distros released ghostscript fixes this week addressing remote code execution, information disclosure and denial of service issues.   ASB-2018.0221 – [Linux] Multiple McAfee products: Denial of service – Remote/unauthenticated https://portal.auscert.org.au/bulletins/68534 Multiple McAfee products based on linux are affected by the kernel vulnerability know as “SegmentSmack” which allows remote attackers to cause a denial of service condition.A list of products that were vulnerable, not-vulnerable and available patches and mitigations was released. — Stay safe, stay patched and have a good weekend! Marcus.  

Learn more

Week in review

AUSCERT Week in Review for 14th September 2018

AUSCERT Week in Review for 14th September 2018 Greetings, Another work week is over and there has probably been significant patching activities again following Microsoft’s patch Tuesday. 17 critical vulnerabilities were addressed and also the recently disclosed Zero-Day Task Scheduler vulnerability. In one of the articles referenced below, we see another example of private data exfiltration from our personal electronic devices, and this time from one of the big security players (Trend Micro). Below is a summary (including excerpts) of some of the more interesting stories we’ve seen this week: —– Microsoft September 2018 Patch Tuesday Fixes 17 Critical Vulnerabilities Date Published: 11-09-2018https://www.bleepingcomputer.com/news/security/microsoft-september-2018-patch-tuesday-fixes-17-critical-vulnerabilities/Author: Lawrence Abrams Excerpt: “This Patch Tuesday fixes 17 Critical security vulnerabilities that when exploited could lead to code execution. These vulnerabilities are the most dangerous as if they are exploited could allow a remote attacker to execute commands on a vulnerable computer and essentially take full control.” —– Election infrastructure security: Should we use Internet voting? Date Published: 10-09-2018https://www.helpnetsecurity.com/2018/09/10/election-infrastructure-security/Author: Help Net Security Excerpt: “To protect the integrity and security of U.S. elections, all local, state, and federal elections should be conducted using human-readable paper ballots by the 2020 presidential election, says a new report from the National Academies of Sciences, Engineering, and Medicine.” —– NSW puts digital driver’s licence on a blockchain Date Published: 10-09-2018https://www.itnews.com.au/news/nsw-puts-digital-drivers-licence-on-a-blockchain-512298Author: Justin Hendry Excerpt: “The NSW government’s digital driver’s licence will be underpinned by blockchain technology developed by Australian firm Secure Logic.” “It plans to make digital driver’s licences and digital photo cards available to citizens across the state by the end of 2019.” —– Trend Micro blames data collection issue on code library re-use Date Published: 11-09-2018https://www.cyberscoop.com/trend-micro-mac-app-store-browser-history/Author: Greg Otto Excerpt: “Cybersecurity giant Trend Micro has apologized after researchers discovered that a number of the company’s consumer-facing apps were  collecting users’ browser histories.” —– 2 Billion Bluetooth Devices Remain Exposed to Airborne Attack Vulnerabilities Date Published: 13-09-2018https://www.darkreading.com/attacks-breaches/2-billion-bluetooth-devices-remain-exposed-to-airborne-attack-vulnerabilities/d/d-id/1332815Author: Jai Vijayan Excerpt: “One year after security vendor Armis disclosed a set of nine exploitable vulnerabilities in Bluetooth, some 2 billion devices — including hundreds of millions of Android and iOS smartphones — remain exposed to the threat.” —– Here are a few of this week’s noteworthy security bulletins: 1) ASB-2018.0211.2 https://portal.auscert.org.au/bulletins/68074 Patch Tuesday Windows Updates. 2) ESB-2018.2682 https://portal.auscert.org.au/bulletins/67966 Multiple vulnerabilities including RCEs patched in Chromium. 3) ESB-2018.2683 https://portal.auscert.org.au/bulletins/67970 Multiple vulnerabilities including RCEs patches in Firefox. 4) ESB-2018.2731 https://portal.auscert.org.au/bulletins/68186 More Flash issues. 5) ESB-2018.2698 https://portal.auscert.org.au/bulletins/68030 Linux kernel information leaks, privilege escalations and DOS issues. Stay safe, stay patched and have a good weekend! Marcus.

Learn more

Week in review

AUSCERT Week in Review for 7th September 2018

AUSCERT Week in Review for 7th September 2018 Greetings, Submissions close shortly for comments on the Assistance and Access Bill 2018. This bill is for communication providers to allow law enforcement to access encrypted communication. The type of assistance the bill has requested includes: – removing one or more forms of electronic protection that are or were applied by, or on behalf of, the provider– assisting access to devices or services– installing, maintaining, testing or using software or equipment or assisting with those activities where the provider is already capable of removing this protection– concealing that any other thing has been covertly performed in accordance with the law Souce: https://www.homeaffairs.gov.au/consultations/Documents/industry-assistance-factsheet.pdf https://www.homeaffairs.gov.au/about/consultations/assistance-and-access-bill-2018 Public feedback is open until September the 10th. For more information on having your say, see https://digitalrightswatch.org.au/2018/08/19/defend-encryption/ Here’s a summary (including excerpts) of some of the more interesting stories we’ve seen this week: NIST Releases Draft on BGP SecurityDate Published: 05 September 2018URL: https://www.darkreading.com/perimeter/nist-releases-draft-on-bgp-security/d/d-id/1332740Author: Dark Reading StaffExcerpt: “A new draft publication from the NIST National Cybersecurity Center of Excellence (NCCoE) takes aim at security concerns about the Border Gateway Protocol (BGP), the default routing protocol to route traffic among Internet domains. The paper, “Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation,” is open for public comment until Oct. 15.”—– Google Wants to Kill the URLDate Published: 04 September 2018URL: https://www.wired.com/story/google-wants-to-kill-the-url/Author: Lily Hay NewmanExcerpt: “The focus right now, they say, is on identifying all the ways people use URLs to try to find an alternative that will enhance security and identity integrity on the web while also adding convenience for everyday tasks like sharing links on mobile devices.”—– Five-Eyes nations to force encryption backdoorsDate Published: 03 September 2018URL: https://www.itnews.com.au/news/five-eyes-nations-to-force-encryption-backdoors-511865Author: Juha SaarinenExcerpt: “At the Five Country Ministerial meeting on the Gold Coast last week, security and immigration ministers put forward a range of proposals to combat terrorism and crime, with a particular emphasis on the internet.As part of that, the countries that share intelligence with each other under the Five-Eyes umbrella agreement, intend to “encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services.”…While the rhetoric is sharp, the specifics are vague. Governments won’t specify any particular interception technology, and will leave it to technology companies to create the solutions required that provide lawful access capability.”—– Faster internet speeds for Queensland as undersea cable confirmedDate Published: 07 September 2018URL: https://www.brisbanetimes.com.au/national/queensland/faster-internet-speeds-for-queensland-as-undersea-cable-confirmed-20180907-p5029p.htmlAuthor: Tony MooreExcerpt: “State Development Minister Cameron Dick and Sunshine Coast mayor Mark Jamieson announced on Friday that tech giant RTI Connectivity and the Sunshine Coast Council will build the 550-kilometre undersea cable into the Sunshine Coast by 2020.”—– Here are this week’s noteworthy security bulletins: ASB-2018.0209 – [Android] Google Android devices: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/67930“Multiple security vulnerabilities have been identified in the Android operating system prior to the 2018-09-05 patch level.” ASB-2018.0206 – [Win][UNIX/Linux][BSD][Mobile] Mozilla Firefox: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/67834“Multiple vulnerabilities have been identified in Mozilla Firefox prior to version 62. One of these vulnerabilities have been classified as critical.” ESB-2018.2641 – [UNIX/Linux][Debian] curl: Execute arbitrary code/commands – Remote/unauthenticatedhttps://portal.auscert.org.au/bulletins/67782“Zhaoyang Wu discovered that cURL, an URL transfer library, contains a buffer overflow in the NTLM authentication code triggered by passwords that exceed 2GB in length on 32bit systems.” ESB-2018.2631 – [UNIX/Linux] ghostscript: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/67742“Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary commands on a vulnerable system.” Stay safe, stay patched and have a good weekend!Charelle

Learn more