Hello all,
This week has seen the release of a number of new features and enhancements from Microsoft and some exciting product announcements from other vendors. Sadly, there has also been a plethora of warnings and alerts, some of which are extremely critical. Let’s take a look at the Notable Callouts.
As usual, the complete Red-N Weekly Cyber Security News newsletter report is below the Notable Callouts. Don’t forget, our site, https://red-n-security.com also has searchable archives of past newsletters.
Notable Callouts:
- Exim mail server software has been found to have an unpatched vulnerability which allows remote attackers to execute arbitrary code on affected installations without authorization. As of publication there was no response from the maintainers of Exim. The potential for abuse is monumental as there were 3.5 million Exim servers online, according to Shodan. Additionally, there are five other zero-days that need to be patched.
- Cell Phones – if you have one, expect it to likely go off on October 4, 2023, sometime around 2pm, as the federal government tests the Emergency Alert System.
- CISCO had a bad week. First, Japanese and US authorities alerted the world to Chinese state threat groups having infiltrated and embedded themselves deep in the firmware of some of Cisco’s routers. Guidance was released on detection. Then, as to pile on insult to the injury, that announcement came just one day prior to Cisco’s semi-annual release of updates in which the networking giant revealed patches for eight vulnerabilities affecting its IOS and IOS XE operating systems. At least one of the vulnerabilities is a zero-day. Obviously, if you use Cisco gear, pay attention, and check yours against the announcements.
- Google reclassified a maximum score to a CVE that was originally thought to be only for Chrome browser. It is actually for the WebP graphics library zero-day that we’d brought to light last week. This is now rated a maximum 10 out of 10 on the CVSS score. As if that wasn’t enough, this week, the VP8 and VP9 video code library – libvpx – developed by Google and the Alliance for Open Media was shown to have a zero-day requiring immediate patching. Major browser vendors have, or are in the process of, releasing patches. Naturally, just like with libwep, any software where the libvpx library is being used will need to be updated.
- Motorola in a chilling move is disabling phones that were purchased in Mexico that are not authorized for use on Mexican cellular networks. This action should be condemned as strongly as possible. If the cell carriers don’t want the devices on their networks, don’t allow them to activate. But, to brick a device that a consumer legally purchased is criminal in this writer’s opinion.
- Progress Software can’t catch a break. MOVE-it will go down in history as one of the largest hacks with over 2,100 organizations impacted so far, and now their WS_FTP Server software has been shown to have two flaws, one of which allows unauthenticated attackers to execute remote commands. Thankfully, this does not appear to be under active exploitation, yet.
In Ransomware, Malware, and Vulnerabilities News:
- FBI has warned of “Dual Ransomware” attacks. In which a threat actor may deploy two different encryptors, and then demand two sets of payments.
- SharePoint has a critical authentication bypass vulnerability that now has a PoC out there. Expect bad guys to start actively exploiting it. Patch now if you still used SharePoint on premises.
- House Hearing on Ransomware was recently held in Washington. There is the usual unfortunate partisan posturing by the legislators, but the stories from the victims makes it compelling to watch.
In Other News Events of Note and Interest:
- Kyle Hanslovan from Huntress Labs was recently quoted on CNBC urging adoption of 2FA, as it is the “single biggest” protection from having bad things happen to your accounts.
In Cyber Insurance News:
- Ransomware Insurance Claims from businesses hit a historic high is the headline. It should come as no shock to regular readers. But ransoms are getting larger, and the mitigation, legal, and regulatory costs related to a successful attack are skyrocketing.
While in the process of writing this week’s Red-N-Security newsletter, outside on my enclosed patio, I observed a bandit emerging from my shed. Let me explain, I’d noticed a few days ago that one of the soffits had been loosened and was hanging down. I suspected an animal had successfully breached my defenses. I fixed the soffit and put a security camera, with motion activated spotlight, in a place where it could catch any further activity. Two days later, while reviewing the prior night’s video, I watched as the bandit, a masked criminal known as a racoon, triggered the camera, stared at it for a while, looked around, and then proceeded to hang from the roof and break into the soffit, crawling into my shed to make a royal mess of things. So, after seeing the masked bandit leave, I hurried to seal the breach and this time ensure that it would be impossible to get in again.
My adventure with the determined, brazen masked bandit made me think about security in general. I had thought the shed was secure. I even had a camera with a motion activated spotlight in place. However, when the light came on, and no other consequence happened, the bandit continued her criminal activity. I had the evidence, but the damage inside had already been done. We can have the world’s best detection measures in place, but unless someone is alerted in real-time to respond, or responds quickly, a mess will occur, and a lengthy and potentially costly cleanup will result. Who is watching your shed, or network?
Viscount Zebulon Wamboldt Pike
Red-N Weekly Cyber Security News
Headline NEWS
- Millions of Exim mail servers exposed to zero-day RCE attacks
- FEMA, FCC hold emergency test alert on all cell phones Oct. 4
- Chinese Gov Hackers Caught Hiding in Cisco Router Firmware
- New Cisco IOS Zero-Day Delivers a Double Punch
- Google fixes fifth actively exploited Chrome zero-day of 2023
- Video Encoding Library Leaves Chrome, Firefox and More Open to Zero-Day Attack
- Google assigns new maximum rated CVE to libwebp bug exploited in attacks
- Critical libwebp Vulnerability Under Active Exploitation – Gets Maximum CVSS Score
- Microsoft releases Windows 11 (KB5030310) build 22621.2361 “Moment 4” update
- Motorola is disabling some Android phones purchased in Mexico
- Progress warns of maximum severity WS_FTP Server vulnerability
Ransomware, Malware, and Vulnerabilities News
- Are You Willing to Pay the High Cost of Compromised Credentials?
- DarkBeam leaks billions of email and password combinations
- FBI: Dual ransomware attack victims now get hit within 48 hours
- Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers
- Hackers actively exploiting Openfire flaw to encrypt servers
- From ScreenConnect to Hive Ransomware in 61 hours
- Russian flight booking system suffers ‘massive’ cyberattack
- Duolingo crowned as “undisputed champion of tracking”
- Xenomorph Android malware now targets U.S. banks and crypto wallets
- Building automation giant Johnson Controls hit by ransomware attack
- DHS: Physical Security a Concern in Johnson Controls Cyberattack
- Lazarus hackers breach aerospace firm with new LightlessCan malware
- Ransomware group claims it’s “compromised all of Sony systems”
- Sony cyberattack: Ransomedvc hackers say firm is not paying up
- Ransomware groups are shifting their focus away from larger targets
- DHS unveils one common platform for reporting cyber incidents
- ShadowSyndicate hackers linked to multiple ransomware ops, 85 servers
- GPUs from all major suppliers are vulnerable to new pixel-stealing attack
- GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
- Russian zero-day seller offers $20M for hacking Android and iPhones
- Your Long Password Is Still Easy to Crack
- ‘Snatch’ Ransom Group Exposes Visitor IP Addresses
- Web app, API attacks surge as cybercriminals target financial services
- Newly Discovered APT Attacker AtlasCross Exploits Red Cross Blood Drive Phishing for Cyberattack
- French cybercriminal pleads guilty to fraud and aggravated identity theft for hacking private information
- New ZeroFont phishing tricks Outlook into showing fake AV-scans
- Researchers Release Details of New RCE Exploit Chain for SharePoint
- Exploit released for Microsoft SharePoint Server auth bypass flaw
- How the Okta Cross-Tenant Impersonation Attacks Succeeded
- House Hearing on Ransomware Attacks and Cybersecurity
- Volkswagen stuck in neutral after ‘IT disruption’
- LibreOffice 7.5.7 / 7.6.2 Fresh: Critical security updates
- Bing Chat responses infiltrated by ads pushing malware
Other News Events of Note and Interest
- CEO, ex-NSA hacker says ‘people hate’ this advice—but it’s your ‘single biggest’ protection from scams
- The clock is ticking for businesses to prepare for mandated certificate automation
- Security researcher warns of chilling effect after feds search phone at airport
- Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks
- WordPress.org Expands Two-Factor Authentication Interface to Include Security Keys
- Companies are already feeling the pressure from upcoming US SEC cyber rules
- The Hot Seat: CISO Accountability in a New Era of SEC Regulation
- Mistral AI makes its first large language model free for everyone
- How to scan for AirTags and other Bluetooth trackers with your phone
- How to use the new Windows 11 Backup app
- PowerToys 0.74 brings Text Extractor 2.0, plus stability fixes to FancyZones, and more
- Kerbal Space Program 2 has been found to be flooding the Windows registry
- Announcing Cloudflare Incident Alerts
- Essential Guide to Cybersecurity Compliance
- Old Alexa Nest skills end Sept 29, Google Account migration req
- Do SSD failures follow the bathtub curve? Ask Backblaze
- Bitwarden finally brings 2FA logins to free users
- Google Podcasts will die in 2024
- Google expands its subsea cable infrastructure with Nuvem, connecting the US, Bermuda and Portugal
- Google Search caught indexing users’ conversations with Bard AI
- Google Bard fails to deliver on its promise — even after latest updates
- Google Launches Free & Paid Generative AI Training Courses
- Gmail’s basic HTML view will disappear in January 2024
- Anthropic \ Expanding access to safer AI with Amazon
- Amazon launches its Bedrock generative AI service in general availability
- Cloudflare is now powering Microsoft Edge Secure Network
- Microsoft adds new work and school OneDrive features to help with syncing up file content
- Microsoft kills loophole that let Windows 7 keys activate Windows 11 and 10
- Microsoft releases new free Windows 11 virtual machines with the September 2023 update
- Microsoft clarifies Windows Terminal won’t replace Command Prompt on Windows 11
- Microsoft Announces Copilot Copyright Commitment to Address IP Infringement Concerns
- How to turn Windows Copilot off
- Microsoft fixes Outlook prompts to reopen closed windows
- Microsoft’s SwiftKey keyboard brings more AI-infused superpowers to iOS and Android
- Microsoft is preparing to take the nuclear option with AI
- Microsoft clarifies Windows 11 23H2 update wasn’t to arrive last week
- New features for storage devices on Windows 11 2023 update
- Windows 11’s new ‘Never Combine’ icons feature is almost usable
- Windows 11 KB5030310 update adds recommended websites, fixes 24 issues
- WingetUI gets custom sources, filtering, performance boost, Defender block prevention
- Amazon wants to charge a subscription fee for Alexa eventually