Weekly Cyber Security
News Events &Information
From sources found online in the past seven days
Hello all,
Artificial Intelligence continues to get a bit more adroit. Vulnerabilities continue to show up. And despicable individuals continue to do their dastardly deeds. So, we continue to fight on in our battle to expose the dark underbelly of digital crime, vulnerabilities, and AI-enabled miscreants. Of course, along the way we stop to notice the wonders of our technological age and pause for a moment to be thankful for all that our digitally connected world has done right. So, let’s get to it.
The volume of news and other can appear overwhelming, the best strategy is to read the Notable Callouts below and then skim the full list of linked news item titles that follow for things that pertain to you or your environment or simply interest you, and then selecting them for more information. So, let’s get to it. And don’t forget, our site, https://red-n-security.com also has searchable archives of past newsletters.
Notable Callouts:
- Brocade SAN Appliances and Fibre Channel Switches have multiple flaws, including two backdoor accounts with a publicly available root password. Patch quickly.
- Cisco items blew up my newsfeed with the “ArcandeDoor” exploit. Cisco has released critical patches to address multiple vulnerabilities in its Adaptive Security Appliance (ASA) devices and Firepower Threat Defense (FTD) software. CISA has added two of the vulnerabilities to the Known Exploited Vulnerability (KEV) catalog, which means that they are already under active attack in the wild. The worst of these allows an unauthenticated adversary to execute code remotely as root. “No workarounds are available, and users are strongly encouraged to apply the necessary updates immediately.”
- Flowmon from Progress Software has some issues that allow unauthenticated command injection and privilege escalation, which when combined enable full compromise as root. A Proof of Concept exploit now exists and in short order someone will weaponize this. So, patch now.
- Government Agencies Share logins over email. I’m not sure if this even needs commentary. Sigh. But I will comment. This is why Business Email Compromise (BEC) is such a scourge. The treasure trove of information contained in normal email accounts is massive. And now we see that threat actors have managed to get their digital mitts on our government officials’ secrets due to their lackadaisical security practices. This particular article talks about how the Russian group, Midnight Blizzard, successfully exfiltrated volumes of data from government Microsoft accounts. The impact cannot be overstated. CISA called the hack and data exfiltration, a “grave and unacceptable risk to agencies.”
- Microsoft Exchange has received several hotfixes for issues related to the March 2024 Exchange Security Updates. If your server isn’t experiencing issues, go on with your day and ignore this fix. If your on-premises Exchange server is having problems with OWA not opening in-line images, template problems, Permission issues, and more, then this may be for you. And it may be an opportune time to, yet again, to speak with your C-Level about migrating to Exchange Online, where Microsoft deals with the mitigations and fixes, not you.
- NIST decided to join the 21st century and is finally opening up to FIDO2 standards. Agencies were reluctant to adopt security keys and passkeys until the technology was specifically called out as permitted. Well, now it has been. Cheers from government security admins could be heard all the way to the ISS. If you want to get into the weeds of the new guidance, publication SP.800-63b contains the details.
- TikTok the clock is running out. If not sold within a year, a newly enacted law would make it illegal for web-hosting services to support TikTok, and it would force Google and Apple to remove TikTok from app stores — rendering the app unusable with time. Naturally, ByteDance, the owners of the wildly popular platform, will be appealing what they, and others, deem an unconstitutional overreach.
In Ransomware, Malware, and Vulnerabilities News:
- CISA has long had a vulnerability scanning program, that is at no additional cost to companies. It is making news now, being billed as a Ransomware Warning program, which it truly is. If you have exploitable open ports on the internet, a warning from CISA could just save your business. If you don’t have a scanning program in place, go to CISA.gov and get signed up.
- Oldie, but Goodie. Several articles in this section talk about current exploitation of vulnerabilities that are months, if not years, old. It doesn’t matter how old a hole is. If it still exists, someone will find it and will exploit it. Be prudent and compare your product mix against CISA’s excellent Known Exploitable Vulnerability (KEV) catalog of items. It could save you a world of hurt.
In Other News Events of Note and Interest:
- Baltimore coach allegedly used AI voice cloning to get principal fired. In what might have been a somewhat clever and very evil revenge scheme, a disgruntled employee attempted to get the boss fired by creating a fake recording of the boss making a racist rant. Unfortunately for the perpetrator, he was not good at covering his digital tracks and was uncovered. However, it is only a matter of time before the technology improves to the point where the digital forensics will be inconclusive or impossible to verify.
- Oracle, a mere two years after moving to Texas from California, has just leaked, rather publicly, that they will be moving their worldwide headquarters yet again. This time to Nashville, Tennessee. Larry Ellison appears to be betting much of Oracle’s future on the burgeoning healthcare industry, and apparently Nashville is considered the epicenter of that line of business.
In Cyber Insurance News:
- Coalition Insurance released their 2024 Cyber Claims Report. It has some amazing statistics, including things such as, more than half of claims start in the mailbox, and claims increased 10% year-over-year to an average loss amount of $100,000.
With malicious and adversarial AI continuing to make rapid advances, it is just a matter of time before flawless video and audio of individuals in situations and conversations that have never happened, will begin to appear, foiling attempts to disprove their veracity. We’re seeing the nascent emergence of this potential plague now. And it has really only been about 2 years that this has been widely available. Imagine what the next two years will bring! That is why it is important, now more than ever, to live in such a manner that even if someone sees it with their own eyes, or hears it with their own ears, they still won’t believe it about you and will attest to your character.
Keep the shields up. They really are out to get you.
Viscount Zebulon Wamboldt Pike
Red-N Weekly Cyber Security News
Headline NEWS
- Vulnerabilities Expose Brocade SAN Appliances, Switches to Hacking
- ArcaneDoor – New espionage-focused campaign found targeting perimeter network devices
- Cisco Releases Critical Security Updates to Fix Firewall 0-Days
- Maximum severity Flowmon bug has a public exploit, patch now
- Government agencies shared logins over email
- Microsoft releases Exchange hotfixes for security update issues
- NIST issues digital identity update allowing agencies to use synced passkeys
- US bans TikTok unless it is sold
- TikTok CEO Shou Chew says fight over ban will head to court
Ransomware, Malware, and Vulnerabilities News
- CISA: Cisco and CrushFTP vulnerabilities are being actively exploited
- CISA is launching a ransomware warning program
- Okta warns of “unprecedented” credential stuffing attacks on customers
- Microsoft CEO says company is “doubling down” on cybersecurity after China, Russia hacks
- Researchers sinkhole PlugX malware server with 2.5 million unique IPs
- 2023: A ‘Good’ Year for OT Cyberattacks
- AI set to play key role in future phishing attacks
- Autodesk hosting PDF files used in Microsoft phishing attack
- Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar
- Phishing attacks up 60 percent driven by AI
- Over 1,400 CrushFTP servers vulnerable to actively exploited bug
- Intel community seeks to centralize OSINT under new strategy
- Cyberattacks are on the rise, and that includes small businesses
- Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
- Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability
- North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
- Europol, police of 19 countries take down website that stole passwords and bank details and more
- US government says security flaw in Chirp Systems’ app lets anyone remotely control smart home locks
- The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success
- Microsoft is a national security threat, says ex-White House cyber policy director
- Researchers claim Windows Defender can be fooled into deleting databases
- Hackers infect users of antivirus service that delivered updates over HTTP
- Critical Apache HugeGraph Flaw – Attackers Execute Remote Code
- Kremlin-backed hackers exploit critical Windows vulnerability reported by the NSA
- CISA Warns of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
- Russia’s Fancy Bear Pummels Windows Print Spooler Bug
- Russian hackers claim cyberattack on Tipton wastewater plant
- Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
- Androxgh0st Malware Compromises Servers Worldwide for Botnet Attack
- ToddyCat APT Is Stealing Data on ‘Industrial Scale’
- Prompt Hacking, Private GPTs and Zero-Day Exploits
- Citrix UberAgent Vulnerability Allows Privilege Escalation
- Brokewell: do not go broke from new banking malware!
- Leicester streetlights take ransomware attack personally, shine on 24/7
- Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
- LockBit-leaked DC city agency data from third party
- Cleveland Catholic Diocese confirms data breach
- Computer scientists unveil novel attacks on cybersecurity
- “Junk gun” ransomware: the cheap new threat to small businesses
- Ransomware Groups Are Now Part of ‘Service Industry’
- UnitedHealth confirms it paid ransomware gang to stop data leak
- Ransomware Double-Dip: Re-Victimization in Cyber Extortion
- Ransomware payments surpass $1 billion in 2023, report finds
- Kansas City Scout cyberattack: Traffic camera system down
- Ransomware hack leaves Glendale Unified staff waiting for tax returns
- Thousands of Qlik Sense Servers Open to Cactus Ransomware
- Ransomware attacks surge worries cybersecurity experts: ‘Scattered Spider’ group in focus
- Plasma donation company Octapharma slowly reopening as BlackSuit gang claims attack
- Ransomware Evolution | How Cheated Affiliates Are Recycling Victim Data for Profit
- Targus cyberattack claimed by ransomware group
- Synlab Italia suspends operations following ransomware attack
- 7-Year-Old 0-Day in Microsoft Office Exploited to Drop Cobalt Strike
- Suspected CoralRaider continues to expand victimology using three information stealers
- Over a million Neighbourhood Watch members exposed through web app bug
- PoC Exploit Released For Critical Oracle VirtualBox Vulnerability
- Almost a billion users’ keystrokes possibly leaked by Chinese keyboard apps
- GitHub malware spreads by hackers spoofing Microsoft files
- Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
- VMware ESXi Shell Service Exploit on Hacking Forums: Patch Now
- WP Automatic WordPress plugin hit by millions of SQL injection attacks
- A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites
Other News Events of Note and Interest
- Cool Tool: WinToUSB 8.8
- Cool Tool: Advanced Renamer 3.95: Faster, more accurate file renaming
- AI Detects Deepfake Video Fingerprints
- FCC votes to restore net neutrality rules
- Baltimore coach allegedly used AI voice cloning to get principal fired
- Google is officially a $2 trillion company
- Google: How to remove personal details that appear in Google search results
- Intel issues statement about CPU crashes, blames motherboard makers
- America needs to treat ‘the cloud’ as critical infrastructure
- Coca-Cola signs $1.1 billion deal to use Microsoft cloud, AI services
- Thoma Bravo to take UK cybersecurity company Darktrace private in $5B deal
- iPhone sales drop 19% in China as Huawei demand soars
- Planning a trip? Here are the best eSIMs for international travel
- Three takeaways about the state of Chinese tech in the US
- The NIST/NVD situation and vulnerability management programs
- IBM Q1 earnings report 2024: IBM to acquire HashiCorp
- Oracle’s Larry Ellison announces plans to move world headquarters to Nashville
- Over 52% of workers try to memorize and reuse the same password across multiple apps at work
- TSMC unveils 1.6nm process technology with backside power delivery
- Zero Trust Takes Over: 63% of Orgs Implementing Globally
- Looking outside: How to protect against non-Windows network vulnerabilities
- Ring customers get $5.6 million in privacy breach settlement
- Chrome’s deprecation of third-party cookies delayed again
- Carry-on server flexes up to 256 cores — 480TB NVMe and 4TB RAM
- Intel CPU-dispensing vending machine game spotted in Japan — one user got a Core i7-8700 for $3
- Fedora Linux 40 Officially Released with Linux Kernel 6.8, Here’s What’s New
- Is the Arm version of Windows ready for its close-up?
- PWAs are awesome on Arm — here’s why I’m ditching native Windows apps
- Lessons for CISOs From OWASP’s LLM Top 10
- Nations Require Licensure of Cybersecurity Pros
- Proxmox VE 8.2 Introduces VMware Import Wizard, Enhanced Backup Options, and Advanced GUI Features
- Using Entra ID Support for Passkey Authentication with Microsoft 365
- New Microsoft Incident Response guide helps simplify cyberthreat investigations
- Microsoft has revealed the end of support and availability dates for the classic Teams app
- Microsoft Exec: M365, O365 Suites With Teams Buyable Until Aug 1, 2024
- Microsoft to discontinue Application Guard app and browser extensions in May 2024
- Microsoft strips Windows 11’s Control Panel of another tool
- Microsoft pulls fix for Outlook bug behind ICS security alerts
- The new Microsoft Planner adds more task features designed for frontline workers
- Windows 11 Start menu ads are now rolling out to everyone
- FTC bans most noncompete agreements between employers and workers
- Mozilla turns off its latest security improvement due to download issues in Firefox 125
- No storage is safe from price hikes — Seagate raises hard drive prices, blaming inflation and market forces
- Zilog to end standalone sales of the legendary Z80 CPU