A new set of significant vulnerabilities in the Realtek RTL8170C Wi-Fi module has been disclosed. These flaws allow an attacker to exploit and therefore gain elevated privileges on a device. Security researchers from Israeli IoT security firm Vdoo said in a write-up that "Successful exploitation would lead to show more ...
complete control of the Wi-Fi module and potential root access on the OS (such as Linux or Android) of the embedded device that uses this module”. The Realtek RTL8710C Wi-Fi SoC serves as the foundation for Ameba, an Arduino-compatible programmable platform with peripheral interfaces for developing a variety of IoT applications through devices in the agriculture, automotive, energy, healthcare, industrial, security, and smart home sectors. The vulnerabilities affect all embedded and IoT devices that use the component to connect to Wi-Fi networks. An attacker would ... (read more)
New York's Metropolitan Transportation Authority computer systems was hacked, triggering an onslaught on the largest transit system in North America, according to NY Times. The agency received an alert from the FBI and other government agencies that three of its 18 computer systems had been attacked. The MTA show more ...
insisted it would stop the attack as soon as possible. According to the company, a subsequent forensic review found that no critical information was stolen and that rail service for millions of passengers each day and other activities were not compromised or disrupted at any time. Rafail Portnoy, the MTA's chief technology officer, stated "Importantly, the MTA's existing multi-layered security systems worked as designed, preventing the spread of the attack and we continue to strengthen these comprehensive systems and remain vigilant as cyberattacks are a growin... (read more)
Fancy Product Designer, a WordPress plugin used on over 17,000 websites, contains a critical file upload vulnerability that is currently being exploited in the wild to upload malware to websites where the plugin is installed. The vulnerability was identified by Wordfence's Threat Intelligence team and reported show more ...
to the vendor on May 31. Although the issue has been identified, it has yet to be fixed. Fancy Product Designer is a platform that allows businesses to offer personalized items. Customers can design anything from t-shirts to phone cases by uploading photos and PDF files that can then be integrated into the product. Wordfence said in a write-up published on Tuesday that "Unfortunately, while the plugin had some checks in place to prevent malicious files from being uploaded, these checks were insufficient and could easily be b... (read more)
Fujifilm is investigating a ransomware attack and has shut down part of its network to prevent the infection from spreading, according to BleepingComputer. Fujifilm, commonly known simply as Fuji, is a Japanese multinational company headquartered in Tokyo, Japan that began with optical films and cameras. It has show more ...
since added pharmaceuticals, storage devices, photocopiers, and printers (XEROX), and digital cameras. In 2020, Fujifilm generated $20.1 billion in revenue and employed 37,151 people worldwide. Fujifilm announced today that its Tokyo headquarters was the victim of a cyberattack on Tuesday evening. It is suspected to be a ransomware attack. Fujifilm stated, "FUJIFILM Corporation is currently carrying out an investigation into possible unauthorized access to its server from outside of the company. As part of this in... (read more)
Last month, a popular Russian-language underground forum sponsored a contest that invited its users to submit illegal techniques for conducting Bitcoin attacks, according to The Hacker News. In an announcement made on April 20, 2021, the forum's administrator invited members to submit papers evaluating the show more ...
possibility of targeting cryptocurrency-related technology, including the theft of private keys and wallets and unusual cryptocurrency mining software, smart contracts, and non-fungible tokens (NFTs). The best research will receive a prize of $115,000, whereas in the event is expected to run through September 1. According to Michael DeBolt, Intel 471's Senior Vice President of Global Intelligence, top candidates include issues such as creating a fake blockcha... (read more)
President Joe Biden will discuss cyberattacks with Russian President Vladimir Putin at their bilateral summit later this month in Switzerland, amid a surge in ransomware attacks on American companies by Russia-based hacking gangs. Biden told USA Today News on Tuesday that the White House is looking closely at whether show more ...
to respond against Russia for the rise in ransomware attacks. Then again, he does not believe Putin was testing him before their meeting. During a press conference on Wednesday, White House press secretary Jen Psaki said the United States was not ruling out any ways to respond to cyberattacks. On June 16, Biden will meet with Putin in Geneva, Switzerland. The meeting with Putin comes at the end of Biden's first foreign trip since taking office, during which he will attend a G7 ... (read more)
In Into the Mind of an IoT Hacker at RSA Conference 2021, security specialists Itzik Feiglevitch and Justin Sowder brought up the issue of vulnerability of various IoT devices and the special treatment they require from corporate cybersecurity. They offered a few stunning examples showcasing the state of IoT security show more ...
in today’s businesses. Few cybersecurity specialists keep track of their corporate IoT hardware. More often than not, smart elevators, all sorts of sensors, IPTV, printers, surveillance cameras, and the like are just a motley collection of disparate devices, each with its own OS and proprietary protocols, and many lacking any sort of proper control interface … you get the picture. Your company may have thousands of them. Why IoT devices introduce extra cybersecurity risks IoT devices are not always regarded as belonging to the relevant infrastructure; although a network printer normally counts as a network device, the same isn’t true of “smart building” components or even IP telephony systems. To be clear, such devices tend to be connected to the same network as corporate workstations are. Staff coming and going may complicate the situation even further. The greater the turnover in cybersecurity and IT, the better the chance a new person won’t know a thing about the IoT zoo connected to the network. Perhaps worst of all, some of those devices are accessible from the outside. The reasons may be legitimate — vendor control over some aspect of a device; telework availability; maintenance — but having devices on the corporate network on the one hand, while being permanently hooked to the Internet on the other, is risky. It may sound paradoxical, but the very robustness of modern electronics is another risk factor: Some IoT devices have very long life spans and are running in vastly more complex security environments than they were designed for. For example, some devices run obsolete, vulnerable operating systems that are no longer updated — and even if they can be, updating may require physical access (which can range from difficult to nearly impossible). Some feature unchangeable passwords, debugging backdoors erroneously left in the final firmware release, and many other surprises to spice up the life of an IT security pro. Why attackers take an interest in IoT devices Cybercriminals find IoT devices interesting for several reasons, both for host company attacks and for attacks on other companies. The main uses for compromised smart devices are: Setting up a botnet for DDoS attacks; Mining cryptocurrency; Stealing confidential information; Sabotage; As a springboard for further attacks and lateral movement in the network. Case studies Researchers have described some cases that are fairly ridiculous. These relate to both standard devices connected to the Internet and quite narrowly specialized ones. Two prominent examples highlight ultrasound machines and devices using Zigbee protocols. Ultrasound machine Modern organizations working in the healthcare sector make use of numerous IoT medical devices. To test the security of such devices, researchers bought and tried to hack a used ultrasound machine. They needed only about five minutes to compromise it; the device was running on a version of Windows 2000 that had never been updated. Moreover, they were able not only to obtain control of the device, but also to gain access to the patient data the previous owner hadn’t deleted. Physicians often use medical devices for years, or even decades, without updating or upgrading them. That’s understandable — if it ain’t broke, etc. — but these devices don’t merely operate for a long time in the first organization that acquires them; they are often resold and continue to operate. Zigbee protocols Companies use Zigbee networking protocols, which were developed in 2003 for energy-efficient wireless communication between devices, to build mesh networks, and often to connect various components within a smart building. The result: a gateway somewhere in the office that controls dozens of different devices, such as, for example, a smart lighting system. Some researchers say a cybercriminal could easily emulate a Zigbee device on a regular laptop, connect to a gateway, and install malware there. The cybercriminal would just have to be within the coverage area of the Zigbee network — for example, in the office lobby. Once they controlled the gateway, however, they could sabotage work in any number of ways — for example, by turning off all of the smart lights in the building. How to secure a corporate network Security officers are not always sure whether they should protect IoT devices on the corporate network or protect the corporate network from IoT devices. Actually, both problems need to be solved. The important thing here is to ensure that every item and action on the network is visible. Establish corporate security requires first identifying all devices connected to the network, correctly classifying them, and, ideally, analyzing associated risks. The next step is, of course, network segmentation based on the results of the analysis. If a device is necessary and irreplaceable but has vulnerabilities that updates cannot fix, then you’ll need to configure the network to deny vulnerable devices Internet access and also to remove their access from other network segments. Ideally, use a Zero Trust concept for segmentation. Monitoring network traffic for anomalies in relevant segments is also critical to your ability to trace compromised IoT devices being used for DDoS attacks or mining. Finally, for the early detection of advanced attacks that employ IoT devices as anchors in the network and attack other systems, use an EDR-class solution.
It only took 203 episodes of the Kaspersky Transatlantic Cable podcast for us to change up the format a bit. We teased it over the past few weeks, and this week Ahmed Abdelghani joins Dave and me, bringing a breath of fresh air to episode 204. We open the show with a hidden gem of a crime. British authorities thought show more ...
they were pursuing a cannabis operation only to find a mining operation. The next story is a look at the FBI integration with Have I Been Pwned and some new site features worth looking into. After that, I sit down with Rainer Bock of our team at Tomorrow Unlocked to learn about their latest — some cool videos are on the way, including an interactive one on Carbanak. Unfortunately, we also have to discuss the latest from SolarWinds and why the problem may not be going away as soon as we’d all like. Then, Ahmed gives Dave and me a chance to flex our tech trivia muscles, game-show style. We close out the podcast with a look at CryptoKitties and how one befuddled journalist tried to buy the NFT. If you liked what you heard, please consider subscribing and sharing with your friends. For more information on the stories we covered, see the links below: Sandwell Bitcoin mine found stealing electricity FBI to share compromised passwords with Have I Been Pwned SolarWinds hackers strike State Department aid agency in Russian cyberattack escalation History’s biggest cyber bank heist: Be part of it! Defenders of Digital hacker:Hunter Buying a pink NFT cat was a crypto nightmare
While companies of all sizes are still working out the details of what the return to work looks like, the consensus is overall the same — the pandemic forever changed how and where we work.
These vulnerabilities Talos discovered could allow an attacker to carry out various malicious actions, including corrupting memory on the victim machine and executing remote code.
The hackers did not gain access to systems that control train cars and rider safety was not at risk, transit officials said, adding that the intrusion appeared to have done little, if any, damage.
Check Point Research said that the backdoor has been designed, developed, tested, and deployed over the past three years to compromise a Southeast Asian nation's Ministry of Foreign Affairs.
FireEye said Wednesday it’s selling its products business, including the FireEye name, to a consortium led by private-equity firm Symphony Technology Group for $1.2 billion in cash.
The world’s largest meat processing company has resumed most production after a weekend cyberattack, but experts say the vulnerabilities exposed by this attack and others are far from resolved.
The PPC ads targeted specific IP ranges in the US and probably some other countries. Non-targeted IPs are redirected to legitimate pages that download the correct applications.
Operational technology (OT) is the cyber physical foundation that enables the world’s factories, energy production and transmission facilities, transportation networks, and utilities to function.
The WebKit browser engine contains a use-after-free flaw in its GraphicsContext function which could be triggered by a malicious web page to cause a potential information leak and memory corruption.
A cyber-espionage hacking group is believed to have hacked the website of the Myanmar president’s office and planted a backdoor trojan inside a localized Myanmar font package.
Founded in 2013, the Austin, Texas-based company provides organizations with security and management solutions to keep corporate apps and data protected on employees’ personal mobile devices.
The recovery cost of a ransomware attack tripled from $1.1m in 2020 to $3.38m in 2021 as India topped the list of 30 countries worldwide for ransomware attacks, a new report said on Tuesday.
The company said it has been aware of the possibility of a ransomware attack since the late evening of June 1, 2021, and that they have taken steps to suspend all affected systems.
SMTP (Simple Mail Transfer Protocol, the main email transmission protocol in TCP/IP networks) offers no protection against spoofing, so it is fairly easy to spoof the sender’s address.
Group-IB has discovered a database and source code allegedly belonging to a bulletproof hosting provider named DDoS-Guard posted for sale on a cybercrime forum on May 26.
The total number of incidents grew by 51% since 2019. Seven out of 10 attacks were targeted. The most popular targets were governments (19%), industrial companies (12%), and medical institutions (9%).
Although the bot was first discovered earlier this year, the latest activity shows numerous changes to the bot, ranging from different C2 communications and the addition of new exploits for spreading.
A new set of critical vulnerabilities has been disclosed in the Realtek RTL8170C Wi-Fi module that an adversary could abuse to gain elevated privileges on a device and hijack wireless communications.
The Altdos hacker group claimed to have accessed the retailer's membership database, stolen information from it, and used the data to blackmail Audio House, the retailer added.
Experts laid bare the tactics adopted by Chinese threat actors to consistently exploit Pulse Secure VPN devices and drop malware to exfiltrate sensitive information. Looking at the scenario, security agencies need to buckle up for more challenging events and detect such threats to stay protected against them.
Google researchers detail Half-Double, another Rowhammer attack technique, that could help criminals bypass current defenses and steal or manipulate data stored in memory. This recent study on the new Rowhammer bug variant is expected to help both researchers and industry partners to work together and develop a solution to fix this problem.
Proof of concept exploit for the OpenSLP heap overflow in VMware ESXi versions 7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, and 6.5 before ESXi650-202102101-SG.
Ubuntu Security Notice 4980-1 - Kevin Backhouse discovered that polkit incorrectly handled errors in the polkit_system_bus_name_get_creds_sync function. A local attacker could possibly use this issue to escalate privileges.
Red Hat Security Advisory 2021-2229-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a HTTP request smuggling vulnerability.
Red Hat Security Advisory 2021-2230-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include HTTP request smuggling, HTTP response splitting, denial of service, information leakage, and insecure permissions vulnerabilities.
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
Red Hat Security Advisory 2021-2238-01 - The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2021-2235-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2021-2237-01 - The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2021-2243-01 - Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, the cargo-vendor plugin, and required libraries. This enhancement update adds the rust-toolset-1.49 packages to Red Hat Developer Tools. Issues addressed include double free and use-after-free vulnerabilities.
Red Hat Security Advisory 2021-2239-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only show more ...
the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include buffer overflow, denial of service, and integer overflow vulnerabilities.
Red Hat Security Advisory 2021-2233-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.11.0 ESR.
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged show more ...
the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.
Red Hat Security Advisory 2021-2236-01 - The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Issues addressed include a privilege escalation vulnerability.
Ubuntu Security Notice 4979-1 - Kiyin discovered that the NFC LLCP protocol implementation in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service. Kiyin discovered that the NFC LLCP protocol implementation in the Linux kernel did not properly deallocate show more ...
memory in certain error situations. A local attacker could use this to cause a denial of service. Various other issues were also addressed.
Ubuntu Security Notice 4978-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, re-enable camera devices without an additional permission prompt, spoof the browser UI, or show more ...
execute arbitrary code. It was discovered that filenames printed from private browsing mode were incorrectly retained in preferences. A local attacker could potentially exploit this to obtain sensitive information. Various other issues were also addressed.
Ubuntu Security Notice 4977-1 - Kiyin discovered that the NFC LLCP protocol implementation in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service. Kiyin discovered that the NFC LLCP protocol implementation in the Linux kernel did not properly deallocate show more ...
memory in certain error situations. A local attacker could use this to cause a denial of service. Various other issues were also addressed.
Red Hat Security Advisory 2021-2214-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.11.0 ESR.
A new set of critical vulnerabilities has been disclosed in the Realtek RTL8170C Wi-Fi module that an adversary could abuse to gain elevated privileges on a device and hijack wireless communications. "Successful exploitation would lead to complete control of the Wi-Fi module and potential root access on the OS (such as Linux or Android) of the embedded device that uses this module," researchers
An ongoing cyber-espionage operation with suspected ties to China has been found targeting a Southeast Asian government to deploy spyware on Windows systems while staying under the radar for more than three years. "In this campaign, the attackers utilized the set of Microsoft Office exploits and loaders with anti-analysis and anti-debugging techniques to install a previously unknown backdoor on
New upgrades have been made to a Python-based "self-replicating, polymorphic bot" called Necro in what's seen as an attempt to improve its chances of infecting vulnerable systems and evading detection. "Although the bot was originally discovered earlier this year, the latest activity shows numerous changes to the bot, ranging from different command-and-control (C2) communications and the
Major software vulnerabilities are a fact of life, as illustrated by the fact that Microsoft has patched between 55 and 110 vulnerabilities each month this year – with 7% to 17% of those vulnerabilities being critical. May had the fewest vulnerabilities, with a total of 55 and only four considered critical. The problem is that the critical vulnerabilities are things we have seen for many years,
Graham Cluley Security News is sponsored this week by the folks at 1Password. Thanks to the great team there for their support! The majority of enterprise data breaches are still tied to weak password and secrets management habits among employees. 1Password’s new white paper highlights these and other findings show more ...
to illustrate how password management software … Continue reading "It’s time to get serious about enterprise password management – download this 1Password white paper now"
The US military has been caught exposing its nuclear weapons secrets, and we explore the world of nerdy miners. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.
The Conti ransomware gang has successfully managed to extort millions of dollars out of an organisation once again. What's notable on this occasion is that the Conti group's corporate victim is ExaGrid, a backup company.
Cybercriminals are running an online competition offering big prizes to anyone who believes they have found an unusual way to help crooks steal cryptocurrency. Read more in my article on the Tripwire State of Security blog.