Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Unknown User Account ...

 Security

Customers are warned by Zyxel of various attacks on numerous firewalls and devices. Whether the vulnerabilities are new and the number of customers affected along with their geographical region are still unknown, according to Ars Technica. Customers must follow the guidance given by the company in order to keep their   show more ...

Zyxel devices secure. They are strongly advised to be aware of phishing attacks and to use two-factor authentication, patch their devices, and configure their appliances with the lowest amount of privileges allowed.  Devices connected to the Internet can be targeted for attacks if hackers gain access to them and connect to previously unknown accounts hardwired into the devices. It is still uncle... (read more)

image for 30 Million Dell Devi ...

 Security

Due to Dell's flawed update method, hackers may be able to exploit four separate vulnerabilities in order to gain complete control of affected devices. This issue affects 129 tablets, laptops, and PCs, all of which being protected by Secure Boot. The security flaws have a CVSS rating of 8.3 out of 10, says Threat   show more ...

Post.  According to Eclypsium researchers, the flaws allow privileged network attackers to bypass Secure Boot protections, affect the device boot, subvert the OS system and higher-layer security controls. They estimated that 30 million Dell devices are affected worldwide.  Dell began releasing patches for some of its devices yesterday, with more to follow next month.  The flaw is in a utility feature called BIOSConnect, which is used to do remote OS recoveries or firmware updates on the device. Dell SupportAssist, a support tool that comes preloaded on these devices, comes ... (read more)

image for Remote factory reset ...

 Business

Many Western Digital My Book users complain that their devices have been reset to factory defaults. Even worse, all the information on them suddenly disappeared. It is not yet clear whether the cause of the incident was a technical failure or an attack, but we recommend that all owners disconnect their My Book Live   show more ...

and My Book Live Duo drives from the Internet, at least until more details from the vendor will be available. What happened to WD My Book Live According to Bleeping Computer, log analysis shows that devices received a remote command to reset their settings to factory default. That procedure includes complete disk wiping. Message on the Western Digital support site says that devices were compromised via remote code execution (RCE) class vulnerability. WD support suspects that CVE-2018-18472, reported in 2018 is to blame. Any malefactor, who knows exact IP address of a WD My Book Live device can exploit the vulnerability. Experts assigned to a CVE-2018-18472 a severity rating of 9.8 — that is, it is a critical vulnerability. Why My Book Live were vulnerable WD My Book Live are network-attached storage (NAS) devices that are popular among both home users and small businesses. They support remote access to the stored data, as well as backup creation. To work as intended, the device needs a stable Internet connection with access to My Book Live cloud service. According to that same Western Digital message, last time My Book Live and My Book Live Duo received firmware updates was in 2015. Consequently, the developers of the update had no way of considering the CVE-2018-18472 vulnerability. Western Digital continues to investigate the incident and promises to release new details shortly. How to protect data on the My Book Live devices First: disconnect the My Book Live and My Book Live Duo from the Internet as soon as possible. If it’s difficult to figure out how to do this using your router settings, disconnect the drive from the network physically, and then configure the router correctly. This way you will keep your data intact if your device was not affected by the incident yet. After that, you should wait for news from Western Digital. Perhaps they will find a way to close the vulnerability, or even to restore the data for those users whose information was wiped. In general, we would recommend using Internet-isolated solutions for creating and storing backups of important information. Sure, it will prevent you from accessing backups remotely. On the bright side, it will prevent anyone else from accessing them remotely, thus it will be better for the backups integrity. You can automate backup creation with security solutions with corresponding functionality.

image for MyBook Users Urged t ...

 Latest Warnings

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a previously unknown critical flaw that can be triggered by anyone who knows the Internet address of an affected   show more ...

device. One of many similar complaints on Western Digital’s user forum. Earlier this week, Bleeping Computer and Ars Technica pointed to a heated discussion thread on Western Digital’s user forum where many customers complained of finding their MyBook Live and MyBook Live Duo devices completely wiped of their data. “Western Digital has determined that some My Book Live and My Book Live Duo devices are being compromised through exploitation of a remote command execution vulnerability,” the company said in a statement June 24. “In some cases, this compromise has led to a factory reset that appears to erase all data on the device. The My Book Live and My Book Live Duo devices received its final firmware update in 2015. We understand that our customers’ data is very important. We are actively investigating the issue and will provide an updated advisory when we have more information.” Western Digital’s brief advisory includes a link to an entry in the National Vulnerability Database for CVE-2018-18472. The NVD writeup says Western Digital WD My Book Live and WD My Book Live Duo (all versions) have a root Remote Command Execution bug. “It can be triggered by anyone who knows the IP address of the affected device, as exploited in the wild in June 2021 for factory reset commands,” NVD wrote. Examine the CVE attached to this flaw and you’ll notice it was issued in 2018. The NVD’s advisory credits VPN reviewer Wizcase.com with reporting the bug to Western Digital three years ago, back in June 2018. In some ways, it’s remarkable that it took this long for vulnerable MyBook devices to be attacked: The 2018 Wizcase writeup on the flaw includes proof-of-concept code that lets anyone run commands on the devices as the all-powerful “root” user. Western Digital’s response at the time was that the affected devices were no longer supported and that customers should avoid connecting them to the Internet. That response also suggested this bug has been present in its devices for at least a decade. “The vulnerability report CVE-2018-18472 affects My Book Live devices originally introduced to the market between 2010 and 2012,” reads a reply from Western Digital that Wizcase posted to its blog. “These products have been discontinued since 2014 and are no longer covered under our device software support lifecycle. We encourage users who wish to continue operating these legacy products to configure their firewall to prevent remote access to these devices, and to take measures to ensure that only trusted devices on the local network have access to the device.” A local administration page for the MyBook Live Duo. Wizcase said the flaw it found in MyBook devices also may be present in certain models of WD MyCloud network attached storage (NAS) devices, although Western Digital’s advisory makes no mention of its MyCloud line being affected. The vulnerable MyBook devices are popular among home users and small businesses because they’re relatively feature-rich and inexpensive, and can be upgraded with additional storage quite easily. But these products also make it simple for users to access their files remotely over the Internet using a mobile app. I’m guessing it is primarily users who’ve configured their MyBooks to be remotely accessible who are experiencing these unfortunate drive wipes. Regardless, it’s probably safest to observe Western Digital’s advice and disconnect any MyBooks you have from ethernet access. If you’d still like to keep your MyBook connected to your local network (at least until you can find a suitable backup for your backups), please make double sure remote access is not enabled in your device settings (see screenshot above).

image for Your password is too ...

 Home + Mobile

Password predictability is one of the most significant challenges to overall online security. Well aware of this trend, hackers often seek to exploit what they assume are the weak passwords of the average computer user. With a little bit of background information, “brute forcing” a simple password is a   show more ...

straightforward undertaking. How are passwords cracked? Cybercriminals use computing power to crack passwords with a method known as a brute force attack. With this method, an attacker guesses at the password repeatedly with the help of computer software/scripts. This makes the process automated and essentially effortless for the attacker. The weaker the password (meaning the easier it is to guess), the quicker an attacker can crack with computing power. So, how do we combat this? The problem is password predictability Passwords can be very easy to guess. Ironically, one factor that contributes to this is one that’s supposed to make passwords safer; the uniform standard most websites impose on users when creating a new password. Typically, sites require a single capital letter, at least 6 charters, numbers and one special character. Attackers can use this information to guess when and where each character may be using only the predictable tendencies of human users. And because many users create a single password that meets these requirements and use them on multiple sites like Netflix, Facebook and Instagram, getting lucky once can lead to a bonanza for cybercriminals. Here is an example of a password that would meets the requirements of most websites: Example1234! This would be considered “secure” in most cases because it meets the most common internet standard for password creation. Now swap “Example” out for the name of a child or pet, and the easily remembered combination is very likely to be someone’s actual, real-life password. It’s easy for the user to remember, and therefore convenient to use across multiple sites. Let’s assume a user has a pet named Toby and plug it into the above example format. Toby1234! This is not a strong password. Pet’s names, children’s names and birthdays are often easily discoverable, especially by mining social media accounts. An attacker may just need to do a little recon on Facebook to scrounge up a handful of likely options. Passwords vs. Passphrases A password is a short character set of mixed digits. A passphrase is a longer string of text making up a phrase or sentence. The important thing to know about passphrases is that, when allowed, they’re far more secure than passwords. The idea that a password should be one word is outdated and retiring it would benefit user security greatly. A method for devising a passphrase is to simply pick a line from your favorite movie, book or song and mix it with capitals and numbers. If we take Arnold’s famous line “I’ll be back,” we can easily make it into a secure passphrase. Original: “I’ll be back” Remove quate marks and spaces, since they can’t be used as password inputs. Illbeback Add some capitals: iLLbeBack Add Numbers: iLL3beBack And finally, a special character: iLL3beBack$ As a fun test, you can use this password-checking tool to see how long it would take a computer to crack your new creation. How long would it take to crack yours? For comparison, let’s take one of our simple password examples from above and see how long it would take to crack. We can use Toby1234! (and yes, some people do use such simple passwords). As you can see, it wouldn’t take long at all. What about our new passphrase iLL3beBack$ I think we’ll be secure for now. More tips and tricks for password safety Using a password manger is the most practical way for making passwords more secure. Users tend to gravitate toward the most convenient solution to a given problem, and password managers keep them from having to memorize a series of complex passwords for different sites. The user can automatically save passwords with an internet browser plugin and let autofill features handle the rest. Here are some other good rules of thumb for password safety: Use a password generatorUse two-factor authentication (2FA) as much as possibleDon’t reuse passwordsBe unpredictable in password formatting Don’t let a predictable password come back to bite you. When made up of easily guessable public information, a weak password can be cracked in minutes. Instead, choose a passphrase or rely on one of the many secure password management tools available on the web today. The post Your password is too predictable appeared first on Webroot Blog.

 Malware and Vulnerabilities

The source code of the notorious MIRAI IoT malware was released to the public by its author back in 2016. This event led to the rise of numerous copycats, creating their own flavors of IoT botnets.

 Malware and Vulnerabilities

In this attack, Microsoft saw attackers using Cobalt Strike and report they stole credentials — including the Active Directory database — and exfiltrated data using rclone.

 Trends, Reports, Analysis

According to Akamai, cyberattack traffic targeting the video game industry took the cake during 2020, growing at a furious rate that outpaced all other industries during the COVID-19 pandemic.

 Malware and Vulnerabilities

After a months-long absence, the malware loader JSSLoader returned in June 2021 cyberattack campaigns by TA543 threat actor, rewritten from the .NET programming language to C++.

 Identity Theft, Fraud, Scams

The phishing emails in this campaign purportedly contain a link to home purchase closing documents from First American, a company whose services include real estate title and settlement.

 Innovation and Research

Researchers developed an attack technique named Adversarial Octopus that could perform a targeted attack on AI-based facial recognition systems. This attack shows that AI systems require much more attention at the security front, and such new attack methods will help raise awareness.

 Breaches and Incidents

Cl0p ransomware hackers just dumped stolen data on their dark website claiming it was stolen from a new victim. Several gang members of the group were detained by Ukrainian police last week but it seems the group is still active. Organizations are advised to proactively follow adequate security measures to stay protected.

 Feed

Ubuntu Security Notice 4998-1 - It was discovered that in some situations Ceph logged passwords from the mgr module in clear text. An attacker could use this to expose sensitive information. Goutham Pacha Ravi, Jahson Babel, and John Garbutt discovered that user credentials in Ceph could be manipulated in certain   show more ...

environments. An attacker could use this to gain unintended access. It was discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access. Various other issues were also addressed.

 Feed

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

 Feed

Ubuntu Security Notice 4995-2 - USN-4995-1 fixed vulnerabilities in Thunderbird. This update provides the corresponding updates for Ubuntu 18.04 LTS. Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could   show more ...

potentially exploit these to cause a denial of service, obtain sensitive information, spoof the UI, bypass security restrictions, or execute arbitrary code. It was discovered that extensions could open popup windows with control of the window title in some circumstances. If a user were tricked into installing a specially crafted extension, an attacker could potentially exploit this to spoof a website and trick the user into providing credentials. Multiple security issues were discovered in Thunderbird's OpenPGP integration. If a user were tricked into importing a specially crafted key in some circumstances, an attacker could potentially exploit this to cause a denial of service or confuse the user. A use-after-free was discovered when Responsive Design Mode was enabled. If a user were tricked into opening a specially crafted website with Responsive Design Mode enabled, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. It was discovered that Thunderbird mishandled ftp URLs with encoded newline characters. If a user were tricked into clicking on a specially crafted link, an attacker could potentially exploit this to send arbitrary FTP commands. It was discovered that Thunderbird wrote signatures to disk and read them back during verification. A local attacker could potentially exploit this to replace the data with another signature file. It was discovered that Thunderbird might load an alternative OTR library. If a user were tricked into copying a specially crafted library to one of Thunderbird's search paths, an attacker could potentially exploit this to execute arbitrary code. It was discovered that secret keys imported into Thunderbird were stored unencrypted. A local attacker could potentially exploit this to obtain private keys. It was discovered that Thunderbird did not indicate when an inline signed or encrypted message contained additional unprotected parts. Various other issues were also addressed.

 Feed

The cybercrime ring that was apprehended last week in connection with Clop (aka Cl0p) ransomware attacks against dozens of companies in the last few months helped launder money totaling $500 million for several malicious actors through a plethora of illegal activities. "The group — also known as FANCYCAT — has been running multiple criminal activities: distributing cyber attacks; operating a

 Feed

A Ukrainian national and a mid-​level supervisor of the hacking group known as FIN7 has been sentenced to seven years in prison for his role as a "pen tester" and perpetuating a criminal scheme that enabled the gang to compromise millions of customers debit and credit cards. Andrii Kolpakov, 33, was arrested in Spain on June 28, 2018, and subsequently extradited to the U.S. the following year on

 Feed

Google's sweeping proposals to deprecate third-party cookies in Chrome browser is going back to the drawing board after the company announced plans to delay the rollout from early 2022 to late 2023, pushing back the project by nearly two years. "While there's considerable progress with this initiative,   show more ...

it's become clear that more time is needed across the ecosystem to get this right," Chrome's

 Feed

Taiwanese networking equipment company Zyxel is warning customers of an ongoing attack targeting a "small subset" of its security products such as firewall and VPN servers. Attributing the attacks to a "sophisticated threat actor," the firm noted that the attacks single out appliances that have remote management or SSL VPN enabled, namely in the USG/ZyWALL, USG FLEX, ATP, and VPN series running

 Feed

A previously undocumented Windows malware has infected over 222,000 systems worldwide since at least June 2018, yielding its developer no less than 9,000 Moneros ($2 million) in illegal profits. Dubbed "Crackonosh," the malware is distributed via illegal, cracked copies of popular software, only to disable antivirus programs installed in the machine and install a coin miner package called XMRig

2021-06
TUE
WED
THU
FRI
SAT
SUN
MON
JuneJulyAugust