Hello all,
This was a quieter week after the digital blizzard of news from the prior one However, there is still plenty to know about, be concerned about, and even fret about. And as always there are moments of sunshine breaking through the digital storms, so read on.
The volume of news and other can appear overwhelming, the best strategy is to read the Notable Callouts below and then skim the full list of linked news item titles that follow for things that pertain to you or your environment or simply interest you, and then selecting them for more information. So, let’s get to it. And don’t forget, our site, https://red-n-security.com also has searchable archives of past newsletters.
Notable Callouts:
- Sixty Nine Percent of Organizations in Europe and the Middle East were infected by Ransomware in 2023 according to Proofpoint’s 2024 State of the Phish! And nearly 60% were infected more than once. That’s mind-blowing! Ryan Kalember, chief strategy officer, Proofpoint, commented: “Cybercriminals know that humans can be easily exploited, either through negligence, compromised identity or – in some instances –malicious intent.” We must do better.
- CISCO patched two high-severity and two medium-severity vulnerabilities in their data-center class FXOS and NX-OS devices. Most were to mitigate DDoS or similar, one was to block remote ACL protection bypass. If you have these in your environment, patch them so the bad-guys don’t ruin your week.
- ConnectWise – Thanks to ConnectWise’s comprehensive response and the tech industry’s rapid, heroic action, a nightmare scenario of massive compromise was avoided. Unfortunately, there were a good number of ScreenConnect instances that did not get patched and are still running a vulnerable version. I can only surmise that the lights are on, but nobody is home. We now must perform due diligence and kick out or block any client devices in our networks that have a vulnerable ScreenConnect version installed. Otherwise, it could be a beachhead into your company.
- Ivanti is still under attack, as reported by both CISA and Mandiant. Many ConnectSecure gateways were compromised before the patch process was worked out and the Ivanti internal tools are not detecting it. It appears that Initial Access Brokers (IAB) have set the stage for future evil waiting to be done. If you have this in use, and haven’t done so, follow Ivanti’s recommendation to completely wipe and reload, and then do comprehensive audits of your internal devices looking for RAT’s, Proxies, and similar.
- Lazarus Group is a Nation State dirt-bag organization that is highly efficient and prolific. They’ve jumped on a vulnerability that Microsoft patched in February’s Patch Tuesday releases. This one is rather critical as it allows an easy path to achieve full control of infected devices. Make sure that you patch CVE-2024-21338 as soon as is practical.
- NIST – the National Institute of Standards and Technology has released their long-anticipated version 2.0 of the Cybersecurity Framework. The most notable change is the addition of a new pilar or function to the current five of: Identify, Protect, Detect, Respond, and Recover. The new addition is an inner ring named Govern “…which emphasizes that cybersecurity is a major source of enterprise risk and a consideration for senior leadership.”
- SubdoMailing is a new rapidly expanding attack that uses forgotten or poorly protected subdomains to use as mail-from domains. Major corporations are being successfully abused. Among the more than 8,000 observed domains are the likes of eBay, VMware, McAfee, CBS, and more. Since they use legitimate, compromised domains, “…emails appear to come from trusted domains and bypass all the industry-standard email-security measures typically in place to block suspicious messages…”. A special website has been created to check domains to see if they are vulnerable and potentially being exploited. Check yours. And educate your users that even if the source appears legitimate, it could still be malicious.
- Undersea Internet Cables were apparently damaged by Houthis terrorists in what is a chilling reminder that our interconnected world is just one inhuman scum away from having major disruptions if they find the right place to do damage. What would your organization do if it was essentially cut off from the Internet for weeks at a time? Now is the time to have those conversations, not when it happens.
- Zyxel patched a Remote Code Execution flaw and other bugs, fixing at least four separate CVEs in “multiple firewall and access point products and urged users to apply mitigations with urgency.” If you use their products, don’t wait. Do it now!
In Ransomware, Malware, and Vulnerabilities News:
- Vishing, Smishing, and Phishing attacks are up 1,265% since the unleashing of Chat-GPT on the world. It isn’t just you, there really is a LOT more malicious garbage targeting your technology.
- Change Healthcare remains in the news. It has been over a week and pharmacies and providers are still struggling to process orders and payments. It will get bad for some soon as they will begin to run out of emergency cash reserves to keep their operations alive. And if the evil scum’s assertion that they exfiltrated 6TB of data proves to be true, the breach implications are staggering! The entire US Library of Congress’ data is only about 15TB.
In Other News Events of Note and Interest:
- Unitee a Chinese robotics firm you’ve probably never heard of just released a video of their Terminator T600. Oh wait, no. They made the H1, a humanoid robot, that broke “world speed records”. This thing’s walking speed is definitely faster than mine. Please don’t connect it to Skynet.
- Leap Year – you’d think that by now all software companies would know that every fours years an extra day is added to the calendar and have a solution to handle that regular event. Well, you’d be wrong. Apparently, Citrix, Sophos, and others were caught off-guard that such a thing was possible and their software malfunctioned this past week on Thursday.
In Cyber Insurance News:
- Who is liable for lost money in a cyber scam? A valuable article that describes the coverages available and what to look for so that you are not left out-of-pocket in the event a malfeasant individual manages to convince someone to move money to them (Such as happened to Seminole County Florida public schools, to the tune of $1.3 million).
One of the frustrations of working in the security world is the continually shrinking patching window and the mindset that doesn’t accept downtime during the day. Let me explain. It is amply clear from news that is shared here every week that one of the primary means of compromise is due to unpatched or unmitigated vulnerabilities. Yet the greatest hurdle that defenders face is being allowed to apply patches in a timely manner – being allowed to do so in a timeframe that allows them to have some semblance of a normal life. Defenders are expected to be available during the working day, but also to mitigate, patch, and remediate solely during ever shrinking after-hours windows. Users are quick to complain if they cannot check their email or get into their CRM, but forget that if a successful breach happens, their email or CRM could be down for weeks while restoration takes place. Just ask the Toronto Public Library system if they’d have preferred to be down one day in the week vs. having been down for 4 months. Or ask Fulton County Georgia, which was successfully attacked in January and still has many systems down, if a one day a month downtime would have been more palatable. The attack surface, speed to exploitation, and methodologies have rapidly changed, but our methods of dealing with them have largely remained the same. We must have a shift in culture to be security focused and accept downtime to mitigate and prevent issues, not just downtime to recover from successful attacks.
Keep the Shields up, they really are out to get you.
Viscount Zebulon Wamboldt Pike
Red-N Weekly Cyber Security News
Headline NEWS
- 69% of Organizations Infected by Ransomware in 2023
- Cisco Patches High-Severity Vulnerabilities in Data Center OS
- Black Basta, Bl00dy ransomware gangs join ScreenConnect attacks
- CISA, Mandiant Warn of a Worsening Situation for Ivanti Users
- Lazarus Group observed exploiting an admin-to-kernel Windows zero-day
- NIST Releases Version 2.0 of Landmark Cybersecurity Framework
- Hijacked subdomains of major brands used in massive ‘SubdoMailing’ spam campaign
- Houthis Knock Out Undersea Internet Connections in Red Sea
- Zyxel Patches Remote Code Execution Bug in Firewall Products
Ransomware, Malware, and Vulnerabilities News
- The new Notepad.exe Will Snitch On You – YouTube video by John Hammond
- Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday
- Chinese Cyberspies Use New Malware in Ivanti VPN Attacks
- NSA says it’s tracking Ivanti cyberattacks as hackers hit US defense sector
- US Charges Iranian Hacker, Offers $10 Million Reward for Capture
- Hugging Face, the GitHub of AI, hosted code that backdoored user devices
- CISA – Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
- CISA warns of Microsoft Streaming bug exploited in malware attacks
- S. says to investigate national security data risks from Chinese vehicles
- A leaky database spilled 2FA codes for the world’s tech giants
- GitHub is under automated attack by millions of cloned repositories filled with malicious code
- Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day
- Unmanaged third-party access threatens OT environments
- Azure-connected IoT devices at risk of RCE due to critical vulnerability
- Sacramento law firm targeted in ransomware attack sues IT firm for $1 million
- Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT
- New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems
- NVIDIA disclose new driver security issues
- Calendar Meeting Links Used to Spread Mac Malware
- iPhone spyware company NSO suffers major defeat in US court
- 20 million Cutout.Pro user records leaked on data breach forum
- Chinese PC-maker Acemagic customized its own machines to get infected with malware
- Three new advanced threat groups targeted industrial organizations last year
- Russian jamming is now messing up GPS signals for Norwegian aviation practically every day
- Russia’s ‘Midnight Blizzard’ Targeting Service Accounts for Initial Cloud Access
- CACTUS: Analyzing a Coordinated Ransomware Attack on Corporate Networks
- Hamilton Canada’s cybersecurity breach disrupts dozens of services as city scrambles to respond
- Lazarus hackers exploited Windows zero-day to gain Kernel privileges
- ConnectWise ScreenConnect bug used in Play ransomware breach, MSP attack
- Ransomware gang seeks $3.4 million after attacking Lurie Children’s Hospital in Chicago, IL
- Epic Games, DJI, Shein, and Kick claimed by Mogilevich ransom gang
- FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks
- LockBit’s Leak Site Reemerges, a Week After ‘Complete Compromise’
- LockBit ransomware returns to attacks with new encryptors, servers
- US prescription market hamstrung for 9 days (so far) by ransomware attack
- Change Healthcare Ransomware Attack: BlackCat Hackers Quickly Returned After FBI Bust
- Ransomware gang claims they stole 6TB of Change Healthcare data
- UnitedHealth slumps on DoJ antitrust probe and ransomware hacker reports
- FBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga.
- Hackers exploit 14-year-old CMS editor on govt, edu sites for SEO poisoning
- Steel giant ThyssenKrupp confirms cyberattack on automotive division
- Russian hackers hijack Ubiquiti routers to launch stealthy attacks
- LabHost cybercrime service lets anyone phish Canadian bank users
- Another pharma firm reports cyberattack and data breach
- Anycubic users say their 3D printers were hacked to warn of a security flaw
- Why governance, risk, and compliance must be integrated with cybersecurity
- Seminole County, FL Public Schools taken for $1.3 million in email phishing scheme
- 1 million books and 4 months later, Toronto’s library recovers from a cyberattack
- AI worm infects users via AI-enabled email clients — Morris II generative AI worm
- Germany takes down cybercrime market with over 180,000 users
- Kaspersky’s report on mobile threats in 2023
- FBI, CISA Release IoCs for Phobos Ransomware
- White House urges developers to dump C and C++
- Apple, Signal Debut Quantum-Resistant Encryption, but Challenges Loom
- WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk
- Critical Flaw in Popular ‘Ultimate Member’ WordPress Plugin
Other News Events of Note and Interest
- Cool Tool: GParted 1.6 Open-Source Partition Editor Improves exFAT Support and Fixes Bugs
- Cool Tool: WinRAR 7.0 exits beta, final version available
- Cool Tool: Kali Linux 2024.1 released with 4 new tools, UI refresh
- Biden issues executive order to shield Americans’ sensitive data from foreign foes
- Unitree’s H1 humanoid breaks world speed record and tackles stairs
- Registrars can now block all domains that resemble brand names
- 5 new top level domains enter early access today
- Samsung’s new microSD card is faster than some SSDs
- SSDs getting more expensive, biggest NAND supplier throttled production to half previous output
- Musk ‘texts’ Nadella about Windows 11’s demands for a Microsoft account
- Exclusive: Google steps up Microsoft criticism, warns of rival’s monopoly in cloud
- Ubuntu 22.04.4 LTS (Jammy Jellyfish) Released with Linux Kernel 6.5, Mesa 23.2
- China’s Lenovo shows off a laptop with a see-through screen
- Researchers warn against using headsets like the Apple Vision Pro daily
- Web Check: Open-source intelligence for any website
- Citrix, Sophos software impacted by 2024 leap year bugs
- Self-pay gas station pumps break across NZ as software can’t handle Leap Day
- You Don’t Need to Use Airplane Mode on Airplanes
- User got a $104K bill from hosting provider: “I thought it was a joke”
- Most companies have a plan to ditch employees’ passwords
- EU probes Microsoft’s security software practices
- Ability to use a mobile device’s camera as a webcam on your PC begins rolling out to Windows Insiders
- No Microsoft Account Needed: How to Set Up Windows With a Local Account
- Microsoft confirms broken Windows 11 update, offers workaround
- Microsoft unveils Copilot Lab to help users get the most out of its AI assistant
- Copilot now features plugins for some awesome applications
- Microsoft extends the deadline to access the classic Teams app to at least July 1, 2024
- Microsoft quietly extends the availability of Windows 11 22H2 updates
- Microsoft fixes Outlook clients not syncing over Exchange ActiveSync
- Windows 10 KB5034843 update released with 9 new changes, fixes
- Microsoft pulls Edge update causing ‘Out of Memory’ crashes
- A new, must-have Conditional Access policy – 365 by Thijs
- Are we close to the holodeck? Google Genie creating playable virtual worlds from a single image