AirDrop Vulns, Linux Hypocrite Commits, Wi-Fi Code Execution, & We’ll Miss You Dan – PSW #692
This week in the Security News, Penetration testing leaving organizations with too many blind spots, A New PHP Composer Bug Could Enable Widespread Supply-Chain Attacks, Apple AirDrop Vulnerability Exposes Users’ Personal Information, Darkside Ransomware gang aims at influencing the stock price of their victims, Security firm Kaspersky believes it found new CIA malware, and a Hacker leaks 20 million alleged BigBasket user records for free!
Announcements
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Hosts
Paul Asadoorian
Principal Security Researcher at Eclypsium
- 1. Jailbreak or Jail – Is Hacking for the Government A Crime?Did they violate the CFAA, copyright laws, or both? - "Maybe. In fact, the U.S. Supreme Court is currently considering a case that will help clarify whether accessing a database you are allowed to access, but for a purpose for which you are not authorized, constitutes a violation of the statute. When Azimuth “cracked” the iPhone, they probably violated something in the license agreement. I have no earthly clue, because, frankly, the license agreement is unreadable. In fact, that’s kind of the point."
- 2. Penetration testing leaving organizations with too many blind spotsPen tests don't test everything, do you still need them? - "surveyed enterprises with 3,000 or more employees and found that 70 percent of organizations perform penetration tests as a way to measure their security posture and 69 percent to prevent breaches, yet only 38 percent test more than half of their attack surface annually. Many organizations are conducting penetration tests to detect and mitigate threats yet remain dangerously vulnerable. The research shows that when using penetration testing as a security practice organizations lack visibility over their internet-exposed assets, resulting in blind spots that are vulnerable to exploits and compromise."
- 3. MythBusters: What pentesting is (and what it is not) – Help Net SecuritySame source, different take: "During pentests, highly technical and skilled individuals manually vet results to identify risks via exploitation attempts and vulnerability chaining. Scanning for vulnerabilities and penetration testing are both necessary components of a comprehensive security strategy. One does not replace the other."
- 4. How to Conduct Vulnerability Assessments: An Essential Guide for 2021"A vulnerability scan provides a point-in-time snapshot of the vulnerabilities present in an organization's digital infrastructure. However, new deployments, configuration changes, newly discovered vulnerabilities, and other factors can quickly make the organization vulnerable again. For this reason, you must make vulnerability management a continuous process rather than a one-time exercise."
- 5. Identifying People Through Lack of Cell Phone Use – Schneier on Security
- 6. Zero-Knowledge Proofs (ZKPs) for vulnerability disclosure
- 7. A New PHP Composer Bug Could Enable Widespread Supply-Chain Attacks"Composer is billed as a tool for dependency management in PHP, enabling easy installation of packages relevant to a project. It also allows users to install PHP applications that are available on Packagist, a repository that aggregates all public PHP packages installable with Composer. According to SonarSource, the vulnerability stems from the way package source download URLs are handled, potentially leading to a scenario where an adversary could trigger remote command injection. As proof of this behavior, the researchers exploited the argument injection flaw to craft a malicious Mercurial repository URL that takes advantage of its "alias" option to execute a shell command of the attacker's choice."
- 8. ISC Releases Security Advisory for BIND"GSS-TSIG is an extension to the TSIG protocol which is intended to support the secure exchange of keys for use in verifying the authenticity of communications between parties on a network. SPNEGO is a negotiation mechanism used by GSSAPI, the application protocol interface for GSS-TSIG. The SPNEGO implementation used by BIND has been found to be vulnerable to a buffer overflow attack."
- 9. Apple AirDrop Vulnerability Exposes Users’ Personal InformationVuln 1 - "After collecting the (hashed) contact identifiers, the attacker can recover phone numbers and email addresses offline. As shown in prior work, recovering phone numbers is possible in the order of milliseconds. Recovering email addresses is less trivial but possible via dictionary attacks that check common email formats such as first.lastname@{gmail.com,yahoo.com,…}." and vuln 2 - "Importantly, the malicious sender does not have to know the receiver: A popular person within a certain context (e.g., the manager of a company) can exploit this design flaw to learn all (private) contact identifiers of other people who have the popular person in their address book (e.g., employees of the company)."
- 10. CISA Releases ICS Advisory on Real-Time Operating System VulnerabilitiesQuite the list of RTOSes! Samsung TVs, ICS gear with VxWorks, wow... Bob may have to go find these exploits (There are many).
- 11. An issue in the Linux Kernel could allow the hack of your system“TALOS-2020-1211 (CVE-2020-28588) is an information disclosure vulnerability that could allow an attacker to view Kernel stack memory . We first discovered this issue on an Azure Sphere device (version 20.10), a 32-bit ARM device that runs a patched Linux kernel.”
- 12. Google Chrome V8 Bug Allows Remote Code-Execution
- 13. Opinion: The FBI just got permission to break into private computers without consent so it can fight hackers
- 14. Experian API Exposed Credit Scores of Most Americans – Krebs on Security
- 15. New stealthy Linux malware used to backdoor systems for years
- 16. HashiCorp reveals exposure of private code-signing key after Codecov compromise
- 17. Adobe releases open source ‘one-stop shop’ for security threat, data anomaly detection
- 18. When Windows bug fixes go bad, IT can now roll back individual changes
- 19. Researchers Secretly Tried To Add Vulnerabilities To Linux Kernel, Ended Up Getting Banned
- 20. A ransomware gang made $260,000 in 5 days using the 7zip utility
- 21. All Your Macs Are Belong To Us
- 22. Signal >> Blog >> Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective
- 23. Sound Engineer Descends Into 9-Hour Trip After Fixing ’60s Radio Equipment Covered In LSDThis story is amazing.
Joff Thyer
Security Analyst at Black Hills Information Security
Larry Pesce
Product Security Research and Analysis Director at Finite State
- 1. ATT&CK® for Containers now available!
- 2. A novel way to deliver XSS….Thread See new Tweets Tweet soooooo a few APRS sites might have XSS problems.... 4 36 101 This was sent over radio btw >> 2 2 24 Replies Replying to @xssfox and
- 3. Security firm Kaspersky believes it found new CIA malware
- 4. Apple’s AirDrop leaks users’ PII, and there’s not much they can do about it
- 5. Bluetooth ? Wi-Fi Code Execution & Wi-Fi Debugging
- 6. Experian API Exposed Credit Scores of Most Americans – Krebs on Security
- 7. Bluetooth ? Wi-Fi Code Execution & Wi-Fi Debugging
Lee Neely
Retired Senior Cyber Advisor at Lawrence Livermore National Laboratory
- 1. 250 Million Americans Sensitive Data Leaked Online by PompompurinPompompurin hacking group has reportedly dropped a 263GB database containing the personally identifiable information (PII) of more than 250 million U.S. citizens on a popular hacking forum. Information reportedlyincludes victims' full names, telephone numbers, mailing addresses, dates of birth, marital status, zip codes, genders, house rentals, home addresses, credit limits, political affiliations, number of proprietary cars, wages and tax information, number of pets, and number of children.
- 2. Threat Actors Impersonate Chase BankA new phishing campaign has been spotted leveraging phishing emails impersonating JP Morgan Chase Bank in order to steal customers' login credentials. One of the phishing emails appeared to include a credit card statement while the other impersonated a locked account workflow.
- 3. CISA, NIST Provide New Resource on Software Supply Chain AttacksCISA and NIST have released a joint report titled "Defending Against Software Supply Chain Attacks" that details software supply chain attacks, the risks associated with those attacks, and how firms can successfully mitigate those attacks. https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508.pdf
- 4. CISA/NIST Defending Against Software Supply Chain Attacks Joint Report
- 5. NTLM Relay Attack Abuses Windows RPC Protocol VulnerabilityA newly identified NTLM relay attack abuses a RPC vulnerability to enable elevation of privilege from "User" to "Doman Admin." Requires MITM, and POC code is available. Microsoft will not be releasing a patch.
- 6. Actively exploited Mac 0-day neutered core OS security defensesVersion 11.3 for macOS, addresses a zero-day vulnerability (CVE-2021-30657) that was being actively exploited by hackers in order to infect targeted devices with "Shlayer" malware without triggering Mac security mechanisms that have been in place for more than 10 years.
- 7. Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCsClick Studios, the Australian software company behind the Passwordstate password management application, has notified customers to reset their passwords and is publishing information on how to check and fix compromised systems.
- 8. Hacker leaks 20 million alleged BigBasket user records for freeA threat actor has leaked approximately 20 million BigBasket user records containing personal information and hashed passwords on a popular hacking forum. Includes victims' email addresses, SHA1 hashed passwords, addresses, phone numbers, and other sensitive information.
- 9. University of Minnesota security researchers apologize for deliberately buggy Linux patchesUniversity of Minnesota researchers have apologized for intentionally submitting a "buggy" patch into the Linux kernel to test the integrity of the update process without permission.
- 10. Darkside Ransomware gang aims at influencing the stock price of their victims"Darkside" ransomware operators have been spotted threating targeted organizations listed on the NASDAQ and other stock markets with leaking stolen data that could adversely impact their stock prices in order to intimidate them into paying the ransom.
- 11. Logins for 1.3 million Windows RDP servers collected from hacker marketAbout 1.3 million current and historic login credentials from compromised Windows RDP servers have been leaked on the "Ultimate Anonymity Services" (UAS) criminal underground forum.
- 12. AV Under Attack: Trend Micro Confirms Apex One ExploitationTrend Micro is warning customers that hackers are now trying to exploit a previously patched, high-severity vulnerability (CVE-2020-24557) affecting its Apex One, Apex One as a Service, and OfficeScan products that could be exploited by attackers to elevate privileges on vulnerable systems.
Tyler Robinson
Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element