Vulnerability Management, Data Security, Security Staff Acquisition & Development, Distributed Workforce
IoT Cybersecurity Improvement Act, TCL Smart TV Flaw, & Popping Reverse Shells – PSW #675
In the Security News, Verizon has suggestions on how to make DNS more secure, Microsoft is trying to fix another Kerberos vulnerability, Bumble made some security blunders, why trying to write an article about rebooting your router was a terrible idea, popping shells on Linux via the file manager, Trump fired Krebs, backdoors on your TV and why PHP is still a really bad idea!
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Hosts
Paul Asadoorian
Principal Security Researcher at Eclypsium
- 1. CEOs Will Be Personally Liable for Cyber-Physical Security Incidents by 2024 – Security BoulevardWe might need more than this: "Organizations need a way to harden their industrial assets to avoid the costs of an industrial cybersecurity incident both in terms of corporate fees and personal liability to CEO and board members. Organizations must leverage frameworks like ISA/IEC62443, NERC CIP, and MITRE to strengthen their OT assets’ security and select industrial cybersecurity solutions that help create a reliable cyber operational resilience program."
- 2. The Most Common API VulnerabilitiesThis is one of my favorites: " This occurs when an API is not designed to prohibit future requests after a first untrustworthy request was recognized and rejected." You should fix it, but then I will have to adjust my attack code ;)
- 3. macOS Big Sur 11.0.1 Patches 60 Vulnerabilities
- 4. Hackers can use just-fixed Intel bugs to install malicious firmware on PCs"The vulnerabilities allowed hackers with physical access to override a protection Intel built into modern CPUs that prevent unauthorized firmware from running during the boot process. Known as Boot Guard, the measure is designed to anchor a chain of trust directly into the silicon to ensure that all firmware that loads is digitally signed by the computer manufacturer. "
- 5. Windows 10 update problem: We’re fixing Kerberos authentication bug, says Microsoft"Microsoft addressed the vulnerability by changing how the KDC validates service tickets used with the Kerberos Constrained Delegation (KCD) because there was a bypass issue in the way KDC determines if a service token can be used for KCD delegation. Microsoft explains there are three registry setting values – 0, 1, and 2 – for PerformTicketSignature to control it, but admins might encounter different issues with each setting."
- 6. Hacked Security Software Used in Novel South Korean Supply-Chain Attack"In this attack the Lazarus Group, notorious for its 2014 Sony Pictures Entertainment hack, exploits security software made by Wizvera. The software, called Wizvera VeraPort, is used by South Korean government websites and requires visitors to use a VeraPort browser plug-in for identity verification. “To understand this novel supply-chain attack, you should be aware that South Korean internet users are often asked to install additional security software when visiting government or internet banking websites,” ESET wrote."
- 7. Citrix SD-WAN Bugs Allow Remote Code ExecutionWell, that right there is your problem: "The Citrix SD-WAN infrastructure runs on Apache with CakePHP2 as the framework. Researchers at Realmode found a hole in the way the CakePHP2 framework handles URLs. For that, Citrix uses the function “_url in CakeRequest.php”." Who thought it was a good idea to implement this in PHP?
- 8. JWT Authentication With Spring Boot’s Inbuilt OAuth2 Resource Server
- 9. Approach to Hardening Web Servers
- 10. Expert publicly discloses PoC code for critical RCE issues in Cisco Security Manager
- 11. How do I select a security assessment solution for my business? – Help Net Security
- 12. Apple Lets Some of its Big Sur macOS Apps Bypass Firewall and VPNs
- 13. Hackers Steal 46 Million Animal Jam Account Records, Dating Back…
- 14. IoT Cybersecurity Improvement Act Passes Senate
- 15. We infiltrated an IRC botnet. Here’s what we foundVintage! But apparently an active botnet today, and the conversations had with botnet owners are HILARIOUS.
- 16. New Proposed DNS Security Features Released
- 17. Microsoft hopes Windows PCs protection with Pluton security chip
- 18. The effectiveness of vulnerability disclosure and exploit development – Help Net Security
- 19. Cisco Webex bugs allow attackers to join meetings as ghost users
- 20. Inside the Cit0Day Breach Collection
- 21. How to Pop a Reverse Shell with a Video File by Exploiting Popular Linux File Managers"What we can't see in the GIF is the Netcat connection being made to the attacker's system when fake_video.mp4 opens. The target believes fake_video.mp4 is legitimate and has no idea the operating system was just compromised." Turns out you can execute commands inside the .desktop file, neat trick. Not sure if there is a fix, which makes this even neater.
- 22. Why unplugging your router every month is actually good for your Wi-FiThis is the worst article I've read all year: "Rebooting the router could do any number of things that will benefit it. Sometimes, computers just freak out. Perhaps there's a bug that's causing the CPU to overheat. Or, perhaps the system is heavy trouble managing your router's memory. Whatever the issue, turning your router off and then back on again will likely fix it." Just poorly written, and so many statements in this article are simply not true.
- 23. Trump says he fired top cybersecurity official Christopher Krebshttps://flip.it/ms4Oo6
- 24. Microsoft Defender for Linux adds new security featurehttps://flip.it/VUlfyD
- 25. Be Very Sparing in Allowing Site Notifications — Krebs on Securityhttps://krebsonsecurity.com/2020/11/be-very-sparing-in-allowing-site-notifications/
- 26. 29 Addresses to Analyze Malware Faster – LetsDefend Bloghttps://letsdefend.io/blog/29-addresses-to-analyze-malware-faster/
- 27. Report: Researchers Find ‘Backdoor’ Security Flaw in TCL Smart TVsA three-month investigation from security researcher "Sick Codes" and Shutterstock application security engineer John Jackson discovered that it's possible to access a TCL smart TV file system over Wi-Fi via an undocumented TCP/IP port, and then collect, delete, or overwrite files without the need for any sort of password or security clearance. The problem does not affect Roku-based TCL TVs. Original research here: https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/
- 28. Apple released a new MacBook Air and I’m disheartenedJust ignore everything else, the big complaint here is that the new Air looks just like the old Air: "Yet here were the words "new" and "future" and the same basic design and color choices on what looks like the same old Air." Nevermind all of the awesome things introduced with the M1 chip, and also potential security risks (I'm just waiting for the first vulnerabilities in Rosetta 2). Oh, and the incompatibilities since its ARM, not x86.
Jeff Man
Sr. InfoSec Consultant at Online Business Sytems
- 1. Verizon Releases 2020 Cyber Espionage Report
- 2. Hackers Hit COVID-19 Biotech Firm, Cold Storage Giant with Cyberattacks
- 3. Crypto Exchange Liquid Says User Data Possibly Exposed in Security Breach
- 4. Pluto TV likely suffered a security breach affecting 3.2 million accounts
- 5. Luxottica Data Leaked by Hackers After Ransomware Attack, Breach
- 6. How to prevent expensive data breaches in the cloud
- 7. 27.7M Texas Drivers Affected by Third-Party Data Breach
- 8. Data breaches bring more bad news for the travel and leisure industry
Joff Thyer
Security Analyst at Black Hills Information Security
- 1. Enterprise Attacker Emulation and C2 Implant Development w/ Joff ThyerThis class focuses on the demonstration of an Open Command Channel framework called “OpenC2RAT”, and then developing, enhancing, and deploying the “OpenC2RAT” command channel software into a target environment. Students will learn about the internal details of a command channel architecture and methods to deploy in an application-whitelisted context. The class will introduce students to blocks of code written in C#, GoLang, and Python to achieve these goals. In addition, the class will introduce some ideas to deploy existing shellcode such as Cobalt Strike Beacon or Meterpreter within a programmed wrapper to enhance success in the age of modern endpoint defense. Many of the techniques introduced in this class can be used to evade modern defense technologies.
Lee Neely
Retired Senior Cyber Advisor at Lawrence Livermore National Laboratory
- 1. Ransomware attack takes web hosting provider Managed.com servers offlineManaged.com, one of the world's largest web hosting providers, has disclosed it was forced to shut down its entire web hosting infrastructure after being hit by a ransomware attack on Nov. 16 that also reportedly took down "a small number" of customer websites.
- 2. Hacking group exploits ZeroLogon in automotive, industrial attack waveThe possibly Chinese government state-sponsored "Cicada" (APT10, Stone Panda, Cloud Hopper) advanced persistent threat (APT) group has been spotted leveraging the "Zerologon" vulnerability (CVE-2020-1472) in a worldwide attack campaign targeting businesses connected to Japan in order to access and exfiltrate sensitive information.
- 3. Microsoft fixes Windows Kerberos authentication issues in OOB updateMicrosoft has released out-of-band optional updates to fix a known issue that causes Kerberos authentication problems on enterprise domain controllers CVE-2020-17409. Low risk, high complexity and high priv level needed to exploit.
- 4. Australian government warns of possible ransomware attacks on health sectorThe Australian government has issued a security alert today urging local health sector organizations to check their cyber-security defenses, attacks targeting the health care sector with the "SDBBot" remote access Trojan (RAT), which is a known precursor to "Clop" ransomware infections.
- 5. Vertafore data breach exposed data of 27.7 million Texas driversVertafore announced that information of 27.7 million Texas drivers has been exposed in a data breach caused by a human error. Vertafore announced that after an employee inadvertently stored three files containing the PII on an unsecured external storage service that was ultimately accessed by an unknown third party.
- 6. More than 200 systems infected by new Chinese APT ‘FunnyDream’A new Chinese state-sponsored hacking group "FunnyDream" has infected more than 200 systems across Southeast Asia. Activity leverages RIGHTSIDE and ENDRANT malware, among others.
- 7. Millions of Bumble users put at risk after online dating hack
- 8. Over 80,000 ID Cards and Fingerprint Scans Exposed in Cloud LeakMisconfigured Amazon S3 bucket belonging to Canoga Park, Calif.-based used electronics reseller TronicsXchange exposed on the Internet containing more than 2.6 million files that included victims' personally identifiable information (PII) and biometric images
Tyler Robinson
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element