- 1. Colonial Pipeline facing $1,000,000 fine for poor recovery plans
- 2. Release of Technical Report into the AMD Security Processor
This sounds bad: "We identified an implementation issue, a TOCTOU vulnerability in the firmware, where the caller mode is checked a while after the command is pulled from the mailbox. This window gives a malicious kernel sufficient time to submit a BIOS command with address pointing to SMRAM, switch to SMM, and bypass the context check. A “boomerang” attack where a ring-0 attacker tricks the ASP into corrupting SMM memory, leading to privilege escalation." - I am speculating, but this could lead to a Secure Boot bypass...
- 3. Microsoft fixes new NTLM relay zero-day in all Windows versions
- 4. Docker Desktop for Linux finally arrives
- 5. Vulnerability mitigated in the third-party Data Connector used in Azure Synapse pipelines and Azure Data Factory (CVE-2022-29972) – Microsoft Security Response Center
- 6. Biden signs cybercrime tracking bill into law
- 7. Your Phone May Soon Replace Many of Your Passwords – Krebs on Security
- 8. Costa Rica Declares State of Emergency Under Sustained Conti Cyberattacks
Yikes, the US is offering a reward: "The Ministry of Finance was one of the initial targets on April 18, but other Costa Rican government agencies were also affected, including the Ministry of Labor and Social Security; the Ministry of Science, Innovation, Technology and Telecommunications; the National Meteorological Institute, and more. "
- 9. DDoS Attacks by Hacktivists Disrupted Russian Alcohol Supply Chain
Perhaps the most devastating attack of all: "Ukrainian hacktivists took down Russia’s central alcohol distribution platform called Unified State Automated Alcohol Accounting Information System or EGAIS, with DDoS attacks launched on May 2nd and 3rd."
- 10. Lincoln College Set to Close After Crippling Cyberattack
I feel like COVID and ransomware were two factors but other factors may be at play that led to the college shutting down.
- 11. F5 BIG-IP Remote Code Execution – Exploitalert
Also, you want to read this post on HTTP hop-to-hop headers, as the exploit uses this technique: https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers (in what looks like it tells the proxy to remove the X-F5-Auth-Token header, which likely is what leads to the auth bypass)
- 12. Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability
This is dead easy to exploit: "the flaw relates to an iControl REST authentication bypass that, if successfully exploited, could lead to remote code execution, allowing an attacker to gain initial access and take control of an affected system." See the exploit above...Unauthenticated command injection via POST request, yikes!
- 13. BPFDoor?—?an active Chinese global surveillance tool
This is really slick: "It allows a threat actor to backdoor a system for remote code execution, without opening any new network ports or firewall rules. For example, if a webapp exists on port 443, it can listen and react on the existing port 443, and the implant can be reached over the webapp port (even with the webapp running). This is because it uses a BPF packet filter."
- 14. Computer Account Relaying Vulnerabilities Part 2 – Praetorian
- 15. Diving into pre-created computer accounts – TrustedSec
hinging on the old, like I can't believe this was/is a thing: "when you pre-create computer accounts with the Assign this computer account as a pre-Windows 2000 computer checkmark, the password for the computer account becomes the same as the computer account in lowercase. For instance, the computer account DavesLaptop$ would have the password daveslaptop."
- 16. Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver
Disabling AV is a thing for sure: "Utilizing the HashDB API service from OpenAnalysis, we were able to recover the clear-text strings corresponding to the hardcoded CRC64 checksums of the latter sample mentioned above. The list contains process names from well-known AV and EDR vendors, which include, amongst others, processes names from SentinelOne®, Cylance®, Avast®, Carbon Black®, Sophos®, McAfee®, and Malwarebytes®. "
- 17. Nvidia’s LHR limiter has been bypassed, enabling full mining performance
Proof that limiting will almost always be bypassed (okay, so always), but it appears not to have much impact: "Considering how bad the crypto market has been doing lately (Ethereum's price is currently half of its peak) and the improved availability and price of graphics cards, this news will probably not affect the market too much. With most cards, you'd need close to a year to break even, while Ethereum's transition to the Proof-of-Stake algorithm is expected to happen this year."
- 18. Researchers Disclose Years-Old Vulnerabilities in Avast and AVG Antivirus
"Specifically, the shortcomings are rooted in a socket connection handler in the kernel driver that could lead to privilege escalation by running code in the kernel from a non-administrator user, potentially causing the operating system to crash and display a blue screen of death (BSoD) error."
- 19. North Carolina Becomes First State to Prohibit Public Entities from Paying Ransoms
Is this a good thing? - "North Carolina’s new law, which was passed as part of the state’s 2021-2022 budget appropriations, prohibits government entities from paying a ransom to an attacker who has encrypted their IT systems and subsequently offers to decrypt that data in exchange for payment. The law prohibits government entities from even communicating with the attacker, instead directing them to report the ransomware attack to the North Carolina Department of Information Technology in accordance with G.S. 143B?1379."