LinkedIn Breach, Bitcoin From Banks, PrintNightmare, & NFC Flaws in ATMs – PSW #701
This week in the Security News: LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers, flaws let you hack an ATM by waving your phone, PrintNightmare, Bitcoins from Banks and more!
Announcements
Security Weekly Unlocked will be held IN PERSON this December 5-8 at the Hilton Lake Buena Vista! Our Call For Presentations Deadline has been extended through July 23rd at 11:59 pm ET! Visit securityweekly.com/unlocked to submit your presentation!
Hosts
Paul Asadoorian
Principal Security Evangelist at Eclypsium
- 1. Ignorance is Bliss… for HackersAgree? - "To deal with today’s evolving threats, it is imperative that we break this cycle. Relying on a single vendor for both infrastructure and security is not good for your business. We need to start making the hacker’s job harder and not easier. We can do this by employing best-of-breed security practices at all segments of the infrastructure via security products and services that are independent of the underlying infrastructure."
- 2. A hacker is selling 700 million LinkedIn users accounts
- 3. Industrial facilities progressively at risk of data theft and ransomware attacks – Help Net Security
- 4. Netgear Authentication Bypass Allows Router TakeoverWow: "We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). For example: hxxps://10[.]0[.]138/WAN_wan.htm?pic.gif. This is a complete and fully reliable authentication bypass."
- 5. Why MTTR is Bad for SecOps
- 6. 3 Things Every CISO Wishes You Understood
- 7. The KonMari Method for Your Digital Footprint
- 8. PrintNightmare, the zero-day hole in Windows – here’s what to doI feel like this is not the first Print Spooler vulnerability in Windows: "It seems that the newly-disclosed Print Spooler bug discovered the Sangfor researchers wasn’t actually the same security hole that was fixed on Patch Tuesday. In short, the Sangfor crew inadvertently documented an as-yet-undisclosed RCE bug, thus unintentionally unleashing a zero-day exploit." - Oh right, the 2010 print spooler bug compliments of Stuxnet...
- 9. Zero day for every supported Windows OS version in the wild?—?PrintNightmare
- 10. 11 Actions Everyone can Do to Improve Their Cloud Native Security PostureGood article, lots of links to tools (some of which I've used and work really well). However, I have a different definition of cloud-native...
- 11. Vulnerability Found in Industrial Remote Access Product From Claroty
- 12. NSA & CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs
- 13. Microsoft warns of serious vulnerabilities in Netgear’s DGN2200v1 router
- 14. 10 competitors Cisco just can’t kill off
- 15. Who can match the US as a cyber superpower? No onehttps://flip.it/-2gK8N
- 16. Hackers are Targeting Cisco ASA device, After the POC Code was Published Online by Researcher. – CyberWorkx"As the researcher has released the POC code for the XSS vulnerability(CVE-2020-3580), it has gained significant attention in the infosec community. Tenable has informed that cisco has not released any official updates for the POC published and the only solution to fix this issue is to prioritize the patching for the CVE-2020-3580" - To publish the PoC or not to publish si the question?
- 17. Exclusive: Hacker reveals smart meters are spilling secrets about the Texas snowstorm
- 18. SonicWall ‘Botches’ October Patch for VPN Bug
- 19. Microsoft signed a malicious Netfilter rootkit"The company said that the threat actor’s goal is to cheat gaming systems: “To use the driver to spoof their geo-location to cheat the system and play from anywhere,” according to Microsoft’s advisory. “The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers.”" - If the goal was to cheat games, what could even more evil attackers do and what will they try to get drivers signed?
- 20. NFC Flaws Let Researchers Hack ATMs by Waving a Phone"Rodriguez has built an Android app that allows his smartphone to mimic those credit card radio communications and exploit flaws in the NFC systems' firmware. With a wave of his phone, he can exploit a variety of bugs to crash point-of-sale devices, hack them to collect and transmit credit card data, invisibly change the value of transactions, and even lock the devices while displaying a ransomware message. Rodriguez says he can even force at least one brand of ATMs to dispense cash—though that "jackpotting" hack only works in combination with additional bugs he says he's found in the ATMs' software"
- 21. How to convince your boss that cybersecurity includes Active Directory" Here’s the punchline: Everything relies on Active Directory. To get your boss to care, start with a discussion about operations and which parts are business critical. Have a business-level discussion, with you keeping score at a technical level. For example, when your boss says “Development needs to be running 100 percent of the time,” you work backward through all the systems, applications, and endpoints that need AD to function."
- 22. Vuls · Agentless Vulnerability Scanner for Linux/FreeBSD
Joff Thyer
Security Analyst at Black Hills Information Security
Lee Neely
Senior Cyber Advisor at Lawrence Livermore National Laboratory
- 1. Cobalt Strike Usage Explodes Among CybercrooksResearchers say that between 2019 and 2020, they witnessed a 161 percent year-over-year increase in the number of real-world attacks leveraging the commercially available, legitimate pen testing tool "Cobalt Strike" and that use of the tool has become "fully mainstream in the crimeware world."
- 2. Over 200,000 Students Data Leaked in CyberattackThe Malaysian pro-Palestinian hacking group "DragonForce" revealed June 20 via Telegram that it hacked job placement firm AcadeME, which serves various colleges and universities throughout Israel, and stole PII belonging to more than 200,000 Israeli students who have used the site since 2014.
- 3. PoC exploit accidentally leaks for dangerous Windows PrintNightmare bug – The Record by Recorded FutureProof-of-concept exploit code has been published online today for a vulnerability in the windows print spooler dubbed "PrintNightmare"
- 4. PJobRAT Disguised as Android Dating App Steals contacts and GPS dataThe cybersecurity experts of Cyble along with 360 Core Security Lab have recently detected the PJobRAT spyware in dating and instant messaging apps. Not only that even, the analysts have also claimed that the spyware samples disguised themselves as Android dating apps.
- 5. Hackers Trick Microsoft Into Signing Netfilter Driver Loaded With Rootkit MalwareMicrosoft on Friday said it's investigating an incident wherein a driver signed by the company turned out to be a malicious Windows rootkit that was observed communicating with a command-and-control (C&C) server as part of an attack targeting gaming environments in China.
- 6. FBI director Chris Wray urges companies stop paying ransoms to hackersHis message before the U.S. Senate last week was simple: companies that choose to pay ransom to malware authors is only inspiring the criminal groups to broaden their attacks against vulnerable and/or high-value computer networks.
- 7. Credential Phishing Campaign Exploits Housing BoomExceptionally high demand in the housing market has created the opportunity for a timely new lure in a credential phishing campaign. Emails in this campaign reached users in a variety of sectors and arrived in environments protected by several different secure email gateways (SEGs).
- 8. Malware author made $2 million after infecting 222,000 Windows systems – The Record by Recorded FutureThe malware known as “Crackonosh”, which gained recent notoriety for infecting highly popular games, has reportedly infected over 222,000 computers since 2018 and “earned” over $2 million to its author(s).
- 9. Pakistan-linked hackers targeted Indian power company with ReverseRatA threat actor has been spotted targeting government and energy organizations in the South and Central Asia regions since at least January 2021 in spear-phishing attacks designed to infect targeted Windows systems with the "ReverseRAT" .NET backdoor and steal sensitive data.
- 10. Malware blamed for remotely wiping WD My Book Live users’ disksHard disk maker Western Digital said Thursday that some users of its My Book Live cloud storage devices were suddenly losing all their data due to "malicious software" and recommended all users disconnect the devices from the internet.
- 11. NFC Flaws Let Researchers Hack ATMs by Waving a PhoneFlaws in card reader technology let a security firm consultant wreak havoc with point-of-sale systems and more.
- 12. LinkedIn breach reportedly exposes data of 92% of users – 9to5MacA second massive LinkedIn breach reportedly exposes the data of 700M users, which is more than 92% of the total 756M users. The database is for sale on the dark web. Not as much a breach, more of a collection of things scraped contrary to the TOS per LinkedIn.
- 13. Fix for PrintNightmare CVE-2021-1675 exploit to keep your Print Servers running while a patch is not availableThe exploit works by dropping a DLL in a subdirectory under C:WindowsSystem32spooldrivers By restricting the ACLs on this directory (and subdirectories) we can prevent malicious DLLs to be introduced by the print spooler service.
- 14. $6 Billion NCR Opens Bitcoin Purchases To 650 Banks And Credit Unions650 U.S. banks will soon be able to offer bitcoin purchases to an estimated 24 million total customers. As part of the deal between enterprise payments giant NCR and digital-asset management firm NYDIG, community banks, including North Carolina-based First Citizens Bank, and credit unions, including Bay Federal Credit Union in California, will be able to offer their clients cryptocurrency trading through mobile applications built by the payments provider.
Tyler Robinson
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element