Weekly cyber-facts in review 22/08/21 - Aiuken

Page created by Leo Griffin
 
CONTINUE READING
Weekly cyber-facts in review 22/08/21 - Aiuken
Weekly cyber-facts
in review
22/08/21
Weekly cyber-facts in review 22/08/21 - Aiuken
2 | Weekly cyber-facts in review

          Vulnerabilities In
          Review
3 | Weekly cyber-facts in review

       Voltage Glitching Attack on AMD Chips
       Researchers have discovered a voltage failure attack on AMD chips, specifically related to SEV (Secure Encrypted Virtualization) technology, which is present in AMD's EPYC processors
       and is designed to protect virtual machines (VMs) and the data they store against internal threats with elevation of privilege. This is used in cloud environments. SEV protects data by
       encrypting VM memory, and encryption keys are protected with AMD's Secure Processor (SP). An attacker who has physical access to the target system can gain access to the memory
       contents of the SEV-protected VM by launching a voltage failure injection attack on the SP.

       New Drupal patches
       The Drupal content management system has released several updates as part of its support program. Patches have been released to address several detected vulnerabilities that could
       affect versions 8.9, 9.1, and 9.2. An attacker could use these vulnerabilities to try to take control of the affected systems.

       Vulnerability in Wordpress SEOPress
       It has been discovered a stored cross-site scripting (XSS) vulnerability in the SEOPress WordPress plugin. SEOPress is a search engine optimization (SEO) tool that lets site owners
       manage SEO metadata, social-media cards, Google Ad settings, etc., and is installed on more than 100.000 sites. The vulnerability is tracked as CVE-2021-34641, which allows any
       authenticated user, like a subscriber, to call the REST route with a valid nonce, and to update the SEO title and description for any post. Depending on what an attacker performs, it could
       allow them to perform various malicious actions, including taking full control of the site.

       Vulnerabilities in the GPAC Project library
       Cisco Talos has made public vulnerabilities tracked as TALOS-2021-1297 (CVE-2021-21834 - CVE-2021-21852), TALOS-2021-1298 (CVE-2021-21859 - CVE-2021-21862), and
       TALOS-2021-1299 (CVE-2021-21853 - CVE-2021-21858), both of which affect the GPAC Project on Advanced Content library. GPAC Project is an open-source cross-platform library
       that implements the MPEG4 system standard and provides tools for media playback, vector graphics, and 3D rendering. The project comes with the MP4Box tool that allows the user to
       encode or decode media containers into multiple supported formats. Attackers can use these vulnerabilities to cause buffer overflow and therefore memory corruption
4 | Weekly cyber-facts in review

       Adobe Plugs Photoshop Security Flaws
       Adobe, as part of its support program, releases updates to address vulnerabilities in Photoshop 2020 and 2021. By exploiting these, an attacker could use the patched vulnerabilities to
       execute code as a prelude to taking control of the target system. They also include patched notices for Adobe Media Encoder, Adobe Bridge, Adobe Captivate, and Adobe XMP Toolkit.

       Apple Security Update
       Apple has released a security update to address vulnerabilities in iCloud for Windows 12.5. The patched vulnerabilities are identified as CVE-2021-30779 and CVE-2021-30785, whereby
       processing a maliciously crafted image may lead to arbitrary code execution. In addition, by exploiting these vulnerabilities, an attacker could take control of an affected system.

       Vulnerability in Daemon Tools Pro
       It has been discovered a memory corruption vulnerability in Disc Soft Ltd.'s Daemon Tools Pro, which is a professional emulation software that works with disc images and virtual drives
       that allows user to mount ISO images on Windows systems. This vulnerability is tracked as TALOS-2021-1295 (CVE-2021-21832) and can cause memory corruption in the application if
       the user opens an adversary-created ISO file that causes an integer overflow.

       Mozilla security updates
       Mozilla has released security updates to address vulnerabilities in Firefox 91.0.1 and Thunderbird 91.0.1, including CVE-2021-29991, header splitting possible with HTTP/3 Responses.
       These vulnerabilities could be exploited by an attacker to take full control of the affected system.

       Chrome update
       Google has released a security update for the Chrome web browser to address several identified vulnerabilities. In total, the update includes 9 security fixes, including 7 vulnerabilities
       identified by third parties (CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601, CVE-2021-30602, CVE-2021-30603, CVE-2021-30604). The most severe
       vulnerabilities are CVE-2021-30598 and CVE-2021-30599, two type confusion issues in the V8 JavaScript engine.
5 | Weekly cyber-facts in review

      Vulnerability in Autodesk
      A vulnerability has been discovered that affects the Autodesk licensing service, which is tracked as CVE-2021-27032, Autodesk Licensing Service: Local Privilege Escalation, with a
      CVSS of 7.8. This has been discovered during client penetration test. Autodesk is a world leader in 3D design and development software, whose products are present in many fields,
      such as architecture, engineering, construction, design, etc.

      BadAlloc Vulnerability
      CISA has issued an alert warning of the need to apply the mitigations provided by BlackBerry QNX to reduce the impact of a BadAlloc vulnerability. Specifically, BlackBerry's QNX Real
      Time Operating System (RTOS) has been affected by this vulnerability, which is tracked as CVE-2021-22156. Likewise, BadAlloc is a collection of vulnerabilities affecting multiple RTOSs
      and supporting libraries. This vulnerability could be exploited by an attacker to cause a denial-of-service attack or execute code on the affected devices, taking control of the system.

      Server Name Identification (SNI) flaw
      Cisco warns of a vulnerability, specifically CVE-2021-34749, in Server Name Identification (SNI) request filtering that affects multiple products (3000 Series Industrial Security Appliances
      (ISAs), FTD Software, WSA Software) and all open-source Snort project releases earlier than Release 2.9.18. In addition, other products are currently being investigated to determine if
      they are affected by this vulnerability. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and exfiltration attacks.
6 | Weekly cyber-facts in review

             Issues to keep
             in mind
7 | Weekly cyber-facts in review

                                   ThroughTek’s Kalay cloud platform
                                   Privacy and security of millions of ThroughTek’s Kalay cloud platform
                                   end-users are in potential risk: A critical vulnerability tracked as CVE-
                                   2021-28372 has been identified in a core component of the Kalay cloud
                                   platform which is used by millions of IoT devices (noting CCTV cameras
                                   and domestic surveillance devices) from many vendors. The
                                   exploitation of this vulnerability will allow an attacker to eavesdrop audio
                                   and video data and/or take complete remote control of the affected
                                   device, the only thing the attacker needs is the Kalay unique identifier
                                   (UID) of the targeted user.
8 | Weekly cyber-facts in review

               Ransomware
               in Review
9 | Weekly cyber-facts in review

                  Insurer Tokio Marine suffers a ransomware attack
                  Tokio Marine Holdings, a multinational insurance holding company in Japan, has confirmed that its Singapore branch, Tokio
                  Marine Insurance Singapore (TMIS) has suffered a ransomware attack. At the moment it is unknown when and how the attack
                  occurred, which is being investigated by a third party in order to analyze the systems and evaluate the impact of the attack. Also,
                  at the time the company detected it, it isolated the network and informed government agencies.

                  National Treasury of Brazil suffers a ransomware attack
                   The Brazilian Ministry of Economy has confirmed that the National Treasury has suffered a ransomware attack last weekend,
                   which hit some of their computing systems. At the moment the incident is being investigated with the help of federal police,
                   although it is known that they did not damage the structuring systems of the National Treasury Secretariat, such as the Integrated
                   Financial Administration System (SIAFI) and those related to Public Debt. Likewise, the Brazilian government also issued a joint
                   statement with the Brazilian Stock Exchange on Monday regarding the incident.
10 | Weekly cyber-facts in review

                    Hive ransomware gang attacks Memorial Health System
                    Memorial Health System, network of three hospitals in Ohio and West Virginia, was apparently attacked past weekend (August
                    13th to 15th) by Hive ransomware gang. Consequently, they suffered disruptions of clinical and financial operations.

                    Another ransomware gang is exploiting PrintNighmare vulnerabilities to compromise Windows Servers
                    Once again, as past week, evidence on another ransomware dubbed Vice Society is exploiting PrintNightmare vulnerabilities to
                    launch the so-called ransomware has been identified. We are confident more ransomware gangs are exploiting PrintNightmare
                    vulnerabilities to launch their ransomware families.
11 | Weekly cyber-facts in review

                  Phishing
                  Campaigns
                  in Review
12 | Weekly cyber-facts in review

                 New phishing campaign impersonating FINRA
                 The US Financial Industry Regulatory Authority (FINRA), a non-profit organization supervised by the Securities and Exchange
                 Commission (SEC) and authorized by the US government to regulate all publicly active securities firms and exchange markets,
                 has warn US brokerage firms and brokers of an ongoing phishing campaign impersonating the organization. A very similar
                 campaign was already identified last June, although in this case, the attackers are using at least three different domains,
                 specifically finrar-reporting[.] org, finpro-finrar[.] org and gateway2-finra[.] Org. Currently they have been requested to remove the
                 domains identified as malicious, however it is not ruled out that they are using more.

                 Morse code in phishing campaigns
                 After several researchers conducted research for more than a year, they have observed that attackers changed obfuscation and
                 encryption mechanisms every 37 days on average, with the aim of improving their ability to prevent campaigns from being
                 detected. In addition, attackers moved from using plaintext HTML code to employing multiple encoding techniques, including old
                 and unusual encryption methods like Morse code, to hide these attack segments. In short, attackers will continue to improve or
                 reuse tactics in order to improve both their evasion and effectiveness.
13 | Weekly cyber-facts in review

                 Data Breaches
                 in Review
14 | Weekly cyber-facts in review

                      T-Mobile is investigating an alleged data breach
                      T-Mobile is investigating a possible data breach after a threat actor claimed it has stolen a database containing the information of
                      the company's 100 million customers. T-Mobile is currently investigating the incident, in order to confirm or not both the attack
                      and the theft of the information. Among the data allegedly stolen is information about names, dates of birth, driver's license
                      numbers, IMEI, security PIN, social security numbers, among others. At the moment the input vector used by the attackers is
                      unknown, although they have included a capture of an SSH connection to a production server running Oracle, also claiming to
                      have hacked the production, preparation and development servers.

                      Chase Bank accidentally leaked customer information
                      Chase Bank has accidentally leaked customer information to other customers due to a technical error in its website and online
                      banking application. JPMorgan Chase Bank is a financial services with a $120 billion annual revenue and over 250,000
                      employees worldwide, based in New York City. The issue is believed to have occurred between May 24 and July 14, 2021,
                      causing the personal data of the bank's customers to be leaked, including statements, transaction list, names and account
                      numbers. On the other hand, Chase Bank has found no evidence thus far indicating that the information was misused.
15 | Weekly cyber-facts in review

                 Threat Groups
                 in Review
16 | Weekly cyber-facts in review

                  AdLoad malware splits through Apple’s XProtect antivirus
                  AdLoad, a trojan targeting macOS systems, is executed to deploy various malicious payloads, including adware and Potentially
                  Unwanted Applications (PUAs). While researchers were investigating this campaign, they realized macOS antivirus’ XProtect did
                  not preserve devices form AdLoad.

                  Pakistan-linked threat group compromise WordPress sites to distribute RAT
                   Pakistan-linked threat group, tracked as Aggah, is actively conducting a cyberespionage campaign targeting manufacturing
                   companies in Taiwan and South Korea. The entry vector exploited is a spear-phishing campaign designed to delivered
                   compromised WordPress sites infected with the Warzone RAT.

                  Indra threat group has been linked to recent cyberattacks against Iran
                   July’s attacks against Iran’s transport ministry and national train system have been attributed to Indra threat group, who has
                   presumably conducted the attacks using a wiper malware dubbed Meteor. Indra is an Iranian gang which identified itself as a
                   regime opposition group who has previously attacked different targets in Syria.
17 | Weekly cyber-facts in review

              Other Incidents
              in Review
18 | Weekly cyber-facts in review

                      Colonial Pipeline is warning the victims of the cyberattack it suffered in May
                      The largest fuel pipeline in the United States, Colonial Pipeline, is sending notification letters to individuals affected by the data
                      breach resulting from the DarkSide ransomware attack that hit its network in May. The attack caused the company to have to
                      temporarily close due to the incident. After the attack it was known that some of their confidential information had been stolen,
                      although it is now, after learning that the personal information of the users had been affected, when they are notifying the people
                      affected after the attack

                      Exploits for vulnerabilities affecting Internet Explorer are being leverage by InkySquid APT group

                      It has been identified that North Korea-linked APT group InkySquid is exploiting two vulnerabilities affecting Internet Explorer to
                      launch watering hole attacks against very specific targets and collect intelligence
19 | Weekly cyber-facts in review

               INFRA:HALT
               vulnerabilities’
               impact
20 | Weekly cyber-facts in review

                                                   Major industrial control system vendors have issued security
                                                    advisories regarding INFRA:HALT vulnerabilities’ impact

                              Recently, researchers found 14 vulnerabilities in NicheStack, a TCP/IP stack used by many OT vendors. These vulnerabilities were communicated
                              to HDD Embbeded, who released patches in May 2021. This week several major ICS vendors have released security advisories regarding the
                              impact of these vulnerabilities on its products. Among them, we would like to highlight Schneider Electric, Siemens, Rockwell Automation, and
                              Phoenix Contact. the impacted products are Schneider Electric’s Lexium motion control drivers; Siemens’ SENTRON low voltage products;
                              Rockwell Automation’s 20-COMM-ER EtherNet/IP and 1715-AENTR EtherNet/IP adapters, ArmorStart distributed motor controller, and AADvance
                              safety controllers, and AADvance Eurocard controllers; Phoenix Contact’s LC1x0, ILC1x1 and AXC 1050 industrial controllers, and CHARX
                              programmable charging controller. All of which are exposed to DoS attacks and PLC’s corruption.
Calle Francisco Tomás y Valiente nº 2
Boadilla del Monte · 28660 Madrid (España)
                 Teléfono:+34 912 909 805
                               aiuken.com
You can also read