Malware Devil

Monday, March 1, 2021

Universal Health Services Suffered $67 Million Loss Due to Ransomware Attack

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: “The truth behind Stonehenge….”
image

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-22114
PUBLISHED: 2021-03-01

Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So …

CVE-2021-25914
PUBLISHED: 2021-03-01

Prototype pollution vulnerability in ‘object-collider’ versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.

CVE-2020-36240
PUBLISHED: 2021-03-01

The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVE-2018-25004
PUBLISHED: 2021-03-01

A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.

CVE-2021-25829
PUBLISHED: 2021-03-01

An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.

The post Universal Health Services Suffered $67 Million Loss Due to Ransomware Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/universal-health-services-suffered-67-million-loss-due-to-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=universal-health-services-suffered-67-million-loss-due-to-ransomware-attack

New Jailbreak Tool Works on Most iPhones

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: “The truth behind Stonehenge….”
image

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-22114
PUBLISHED: 2021-03-01

Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So …

CVE-2021-25914
PUBLISHED: 2021-03-01

Prototype pollution vulnerability in ‘object-collider’ versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.

CVE-2020-36240
PUBLISHED: 2021-03-01

The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVE-2018-25004
PUBLISHED: 2021-03-01

A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.

CVE-2021-25829
PUBLISHED: 2021-03-01

An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.

The post New Jailbreak Tool Works on Most iPhones appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/new-jailbreak-tool-works-on-most-iphones/?utm_source=rss&utm_medium=rss&utm_campaign=new-jailbreak-tool-works-on-most-iphones

Passwords, Private Posts Exposed in Hack of Gab Social Network

The Distributed Denial of Secrets group claim they have received more than 70 gigabytes of data exfiltrated from social media platform Gab.
Read More

The post Passwords, Private Posts Exposed in Hack of Gab Social Network appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/passwords-private-posts-exposed-in-hack-of-gab-social-network/?utm_source=rss&utm_medium=rss&utm_campaign=passwords-private-posts-exposed-in-hack-of-gab-social-network

Hackable; How to do Application Security Right – Ted Harrington – ASW #141

In looking at how to do application security right we talk about understanding the difference between defining types of security testing and the goals that security testing should be aiming for. Plus, we highlight how doing security right also means shifting left in terms of addressing security issues in the design phase. And throughout all this is the importance of being able to communicate security principles and how your design and testing reduces risk.

Register for the DevSecOps eSummit for which Ted will be a panelist:

https://onlinexperiences.com/Launch/QReg.htm?ShowUUID=5673DA7C-B8C2-4A3E-B675-C6BBF45DC04F

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw141

The post Hackable; How to do Application Security Right – Ted Harrington – ASW #141 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/hackable-how-to-do-application-security-right-ted-harrington-asw-141/?utm_source=rss&utm_medium=rss&utm_campaign=hackable-how-to-do-application-security-right-ted-harrington-asw-141

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

This is about the Security Operations Center (SOC). And automation. And of course SOC automation.

Let’s start from a dead-obvious point: you cannot and should not automate away all people from your SOC today. Or, as my esteemed colleague said, “Stop Trying To Take Humans Out Of Security Operations.”

Despite this point being dead-obvious today, I want to present a few arguments to further support it — it will be clear why in the end…

We need humans because the attackers are humans with their own creativity, irrationality, weirdness, etc. As one vendor once said, “you have an adversary problem, not a malware problem.” We need to hunt and not rely solely on automated systems for things like detection — hence humans are a must. This side of the argument boils down to “we need humans because the attackers are [also human].” This argument is also enhanced by arguments “why robots suck for security” and all that.

So good automation is a “force multiplier,” not a force replacer. Admittedly, some tasks — like data enrichment — are better done by machines, and humans can — and should — be rid of them. The point is to remove some tasks from humans and not to remove the humans from the SOC [entirely].

Furthermore, bad automation kills. This is due to a perennial problem that also plagues the use of ML/AI in security: garbage in — garbage out. This problem is further boosted with the fact that today’s automation logic (whether for detection or remediation) is just not smart enough for the complex world of IT around it. So, neither the data quality, nor the algorithms measure up. This is all true, while “cybersecurity is the most intellectually demanding profession on the planet.”

ED209, the most famous “failure of security automation” from Robocop (1990)

So. Convinced? Sure. But let’s continue on our journey…

All the while, there are more and more voices for more automation. Their logic is also very understandable. We need automation, because we need to scale better and go faster, we have too much data, alerts, signals, threats, etc. There is much to be said about the value of various forms of automation in security (in general) and in security operations (in particular).

However, as I said above, to keep the discussion sane we always remind ourselves that trying to take the humans out of SOC is more or less insane.

Still with me? OK, but now you’d be somewhat surprised where our journey will suddenly turn…

Now, go and imagine the following scenarios:

  • You face the attacker in possession of a machine that can auto-generate reliable zero day exploits and then use them (an upgraded version of what was the subject of 2016 DARPA Grand Challenge)
  • You face the attackers who use worms for everything, and these are not the dumb 2003 worms, but these are coded by the best of the best of the offensive “community”
  • Your threat assessment indicates that “your” attackers are adopting automation faster than you are and the delta is increasing (and the speed of increase is growing).

Would you still say the same? Would you still give the same advice? All these are very hypothetical in 2021, to be sure, but what about 2025? 2030? 2035?

Frankly, you can cheat and say “the middle way is the way: humans need to work with machines.” And things would feel nice for a moment, until you realize this is what chess players said sometime after their first rout in 1997. There was a concept of human+machine chess that looked really awesome in 1998–2015, but then was quickly and mercilessly killed by the improving neural networks. Naturally, one may counter that chess is mathematically solvable while information security is not (by a wide, wide, wide margin). Sure, this argument holds water …today.

Conclusion

Today, I will still also say “Stop Trying To Take Humans Out Of Security Operations” but somewhere in the very back of my mind, a scary and cold uncoiling worm of doubt is born …

Thanks to Brandon Levene for a great discussion and some text contributed to this post.

Thanks to Dave Aitel for the disruptive ideas that triggered me to write this.


Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait… was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait… appeared first on Security Boulevard.

Read More

The post Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait… appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait/?utm_source=rss&utm_medium=rss&utm_campaign=stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait

Tom Cruise is a Fake. For Real This Time.

Something I’ve always known about Tom Cruise is that he is a fake. Literally. He is a paid actor, who makes a living from being a fake. He is highly paid because apparently his fakes are so good. Now comes a stark warning that evidence has been found of Tom Cruise, the fake, being faked. … Continue reading Tom Cruise is a Fake. For Real This Time.

The post Tom Cruise is a Fake. For Real This Time. appeared first on Security Boulevard.

Read More

The post Tom Cruise is a Fake. For Real This Time. appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/tom-cruise-is-a-fake-for-real-this-time/?utm_source=rss&utm_medium=rss&utm_campaign=tom-cruise-is-a-fake-for-real-this-time

BSides Calgary 2020 – Kurt Pomeroy’s ‘How To Successfully Transition From It Generalist To Penetration Tester’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Kurt Pomeroy’s ‘How To Successfully Transition From It Generalist To Penetration Tester’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Kurt Pomeroy’s ‘How To Successfully Transition From It Generalist To Penetration Tester’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/bsides-calgary-2020-kurt-pomeroys-how-to-successfully-transition-from-it-generalist-to-penetration-tester/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-kurt-pomeroys-how-to-successfully-transition-from-it-generalist-to-penetration-tester

Matt Kelly’s Radical Compliance

via the inimitable Matt Kelly a RadicalCompliance !

via the inimitable Matt Kelly a RadicalCompliance!

Permalink

The post Matt Kelly’s Radical Compliance appeared first on Security Boulevard.

Read More

The post Matt Kelly’s Radical Compliance appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/matt-kellys-radical-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=matt-kellys-radical-compliance

DoD: Get Started With a CMMC Self-Assessment Now | Apptega

The U.S. Department of Defense (DoD) recommends prime contractors and subcontractors in the Defense Industrial Base (DIB) prepare for Cybersecurity Maturity Model Certification (CMMC) requirements in contracts now even though no organizations are yet accredited to conduct official certification assessments.

The post DoD: Get Started With a CMMC Self-Assessment Now | Apptega appeared first on Security Boulevard.

Read More

The post DoD: Get Started With a CMMC Self-Assessment Now | Apptega appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/dod-get-started-with-a-cmmc-self-assessment-now-apptega/?utm_source=rss&utm_medium=rss&utm_campaign=dod-get-started-with-a-cmmc-self-assessment-now-apptega

Europe is the Top Fraud Attacking Region of 2020

Europe displaced Asia to emerge as the overall top attacking region of 2020. Plunging economies and financial hardships in Europe forced a large number of desperate people towards fraud in order to make ends meet The coronavirus pandemic has damaged the global economy and caused financial hardships to millions of people around the globe. People […]

The post Europe is the Top Fraud Attacking Region of 2020 appeared first on Security Boulevard.

Read More

The post Europe is the Top Fraud Attacking Region of 2020 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/europe-is-the-top-fraud-attacking-region-of-2020/?utm_source=rss&utm_medium=rss&utm_campaign=europe-is-the-top-fraud-attacking-region-of-2020

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...