LinkedIn Breach, Bitcoin From Banks, PrintNightmare, & NFC Flaws in ATMs – PSW #701
This week in the Security News: LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers, flaws let you hack an ATM by waving your phone, PrintNightmare, Bitcoins from Banks and more!
Security Weekly Unlocked will be held IN PERSON this December 5-8 at the Hilton Lake Buena Vista! Our Call For Presentations Deadline has been extended through July 23rd at 11:59 pm ET! Visit securityweekly.com/unlocked to submit your presentation!
Agree? - "To deal with today’s evolving threats, it is imperative that we break this cycle. Relying on a single vendor for both infrastructure and security is not good for your business. We need to start making the hacker’s job harder and not easier. We can do this by employing best-of-breed security practices at all segments of the infrastructure via security products and services that are independent of the underlying infrastructure."
Wow: "We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). For example: hxxps://10[.]0[.]138/WAN_wan.htm?pic.gif. This is a complete and fully reliable authentication bypass."
I feel like this is not the first Print Spooler vulnerability in Windows: "It seems that the newly-disclosed Print Spooler bug discovered the Sangfor researchers wasn’t actually the same security hole that was fixed on Patch Tuesday. In short, the Sangfor crew inadvertently documented an as-yet-undisclosed RCE bug, thus unintentionally unleashing a zero-day exploit." - Oh right, the 2010 print spooler bug compliments of Stuxnet...
"As the researcher has released the POC code for the XSS vulnerability(CVE-2020-3580), it has gained significant attention in the infosec community. Tenable has informed that cisco has not released any official updates for the POC published and the only solution to fix this issue is to prioritize the patching for the CVE-2020-3580" - To publish the PoC or not to publish si the question?
"The company said that the threat actor’s goal is to cheat gaming systems: “To use the driver to spoof their geo-location to cheat the system and play from anywhere,” according to Microsoft’s advisory. “The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers.”" - If the goal was to cheat games, what could even more evil attackers do and what will they try to get drivers signed?
"Rodriguez has built an Android app that allows his smartphone to mimic those credit card radio communications and exploit flaws in the NFC systems' firmware. With a wave of his phone, he can exploit a variety of bugs to crash point-of-sale devices, hack them to collect and transmit credit card data, invisibly change the value of transactions, and even lock the devices while displaying a ransomware message. Rodriguez says he can even force at least one brand of ATMs to dispense cash—though that "jackpotting" hack only works in combination with additional bugs he says he's found in the ATMs' software"
" Here’s the punchline: Everything relies on Active Directory. To get your boss to care, start with a discussion about operations and which parts are business critical. Have a business-level discussion, with you keeping score at a technical level. For example, when your boss says “Development needs to be running 100 percent of the time,” you work backward through all the systems, applications, and endpoints that need AD to function."
Researchers say that between 2019 and 2020, they witnessed a 161 percent year-over-year increase in the number of real-world attacks leveraging the commercially available, legitimate pen testing tool "Cobalt Strike" and that use of the tool has become "fully mainstream in the crimeware world."
The Malaysian pro-Palestinian hacking group "DragonForce" revealed June 20 via Telegram that it hacked job placement firm AcadeME, which serves various colleges and universities throughout Israel, and stole PII belonging to more than 200,000 Israeli students who have used the site since 2014.
The cybersecurity experts of Cyble along with 360 Core Security Lab have recently detected the PJobRAT spyware in dating and instant messaging apps. Not only that even, the analysts have also claimed that the spyware samples disguised themselves as Android dating apps.
Microsoft on Friday said it's investigating an incident wherein a driver signed by the company turned out to be a malicious Windows rootkit that was observed communicating with a command-and-control (C&C) server as part of an attack targeting gaming environments in China.
His message before the U.S. Senate last week was simple: companies that choose to pay ransom to malware authors is only inspiring the criminal groups to broaden their attacks against vulnerable and/or high-value computer networks.
Exceptionally high demand in the housing market has created the opportunity for a timely new lure in a credential phishing campaign. Emails in this campaign reached users in a variety of sectors and arrived in environments protected by several different secure email gateways (SEGs).
The malware known as “Crackonosh”, which gained recent notoriety for infecting highly popular games, has reportedly infected over 222,000 computers since 2018 and “earned” over $2 million to its author(s).
A threat actor has been spotted targeting government and energy organizations in the South and Central Asia regions since at least January 2021 in spear-phishing attacks designed to infect targeted Windows systems with the "ReverseRAT" .NET backdoor and steal sensitive data.
Hard disk maker Western Digital said Thursday that some users of its My Book Live cloud storage devices were suddenly losing all their data due to "malicious software" and recommended all users disconnect the devices from the internet.
A second massive LinkedIn breach reportedly exposes the data of 700M users, which is more than 92% of the total 756M users. The database is for sale on the dark web. Not as much a breach, more of a collection of things scraped contrary to the TOS per LinkedIn.
The exploit works by dropping a DLL in a subdirectory under C:WindowsSystem32spooldrivers
By restricting the ACLs on this directory (and subdirectories) we can prevent malicious DLLs to be introduced by the print spooler service.
650 U.S. banks will soon be able to offer bitcoin purchases to an estimated 24 million total customers. As part of the deal between enterprise payments giant NCR and digital-asset management firm NYDIG, community banks, including North Carolina-based First Citizens Bank, and credit unions, including Bay Federal Credit Union in California, will be able to offer their clients cryptocurrency trading through mobile applications built by the payments provider.
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element
The life of a Cybersecurity professional is not for the faint of heart. The job can be stressful, sometimes thankless. And when an attack transpires, you can work long hours knowing the fate of your employer is on the line. Or in the case of an MSSP, the fate of your client. You might even argue that being a managed security services provider magni...
In the leadership and communications section, Who Does Your CISO Report To?, 5 CISO Traps to Avoid and Truths to Embrace, How to effectively communicate cybersecurity best practices to staff, and more!
In the leadership and communications section, Why CISOs Make Great Board Members, Unlock Your Leadership Potential: 12 Must-Read Books to Take Your Skills to the Next Level, How To Get People To Listen To You, and more!