Malware Devil

Friday, April 9, 2021

CISA Launches New Threat Detection Dashboard

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-25373
PUBLISHED: 2021-04-09

Using unsafe PendingIntent in Customization Service prior to version 2.2.02.1 in Android O(8.x), 2.4.03.0 in Android P(9.0), 2.7.02.1 in Android Q(10.0) and 2.9.01.1 in Android R(11.0) allows local attackers to perform unauthorized action without permission via hijacking the PendingIntent.

CVE-2021-25374
PUBLISHED: 2021-04-09

An improper authorization vulnerability in Samsung Members "samsungrewards" scheme for deeplink in versions 2.4.83.9 in Android O(8.1) and below, and 3.9.00.9 in Android P(9.0) and above allows remote attackers to access a user data related with Samsung Account.

CVE-2021-25375
PUBLISHED: 2021-04-09

Using predictable index for attachments in Samsung Email prior to version 6.1.41.0 allows remote attackers to get attachments of another emails when users open the malicious attachment.

CVE-2021-25376
PUBLISHED: 2021-04-09

An improper synchronization logic in Samsung Email prior to version 6.1.41.0 can leak messages in certain mailbox in plain text when STARTTLS negotiation is failed.

CVE-2021-25377
PUBLISHED: 2021-04-09

Intent redirection in Samsung Experience Service versions 10.8.0.4 in Android P(9.0) below, and 12.2.0.5 in Android Q(10.0) above allows attacker to execute privileged action.

The post CISA Launches New Threat Detection Dashboard appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/cisa-launches-new-threat-detection-dashboard/?utm_source=rss&utm_medium=rss&utm_campaign=cisa-launches-new-threat-detection-dashboard

Unofficial Android App Store APKPure Infected With Malware

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-25373
PUBLISHED: 2021-04-09

Using unsafe PendingIntent in Customization Service prior to version 2.2.02.1 in Android O(8.x), 2.4.03.0 in Android P(9.0), 2.7.02.1 in Android Q(10.0) and 2.9.01.1 in Android R(11.0) allows local attackers to perform unauthorized action without permission via hijacking the PendingIntent.

CVE-2021-25374
PUBLISHED: 2021-04-09

An improper authorization vulnerability in Samsung Members "samsungrewards" scheme for deeplink in versions 2.4.83.9 in Android O(8.1) and below, and 3.9.00.9 in Android P(9.0) and above allows remote attackers to access a user data related with Samsung Account.

CVE-2021-25375
PUBLISHED: 2021-04-09

Using predictable index for attachments in Samsung Email prior to version 6.1.41.0 allows remote attackers to get attachments of another emails when users open the malicious attachment.

CVE-2021-25376
PUBLISHED: 2021-04-09

An improper synchronization logic in Samsung Email prior to version 6.1.41.0 can leak messages in certain mailbox in plain text when STARTTLS negotiation is failed.

CVE-2021-25377
PUBLISHED: 2021-04-09

Intent redirection in Samsung Experience Service versions 10.8.0.4 in Android P(9.0) below, and 12.2.0.5 in Android Q(10.0) above allows attacker to execute privileged action.

The post Unofficial Android App Store APKPure Infected With Malware appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/unofficial-android-app-store-apkpure-infected-with-malware/?utm_source=rss&utm_medium=rss&utm_campaign=unofficial-android-app-store-apkpure-infected-with-malware

8 Security & Privacy Apps to Share With Family and Friends

Mobile apps to recommend to the people in your life who want to improve their online security and privacy.
Previous

1 of 9

Next

(Image: Golubovy -- stock.adobe.com)

(Image: Golubovy — stock.adobe.com)

As technology continues to permeate everyday life and data breaches make headlines, most people are growing aware and concerned about issues related to security and privacy.

Research shows data privacy matters to consumers: A story by the Ponemon Institute on behalf of ID Experts found that 68% of consumers have become more worried about the privacy and security of their personal information in recent years — a result of increased social media and mobile device use, along with more awareness of digital privacy threats.

Fifteen percent of consumers have left at least one online purchase process because of perceived security issues in the retail website, one report found last holiday season. Fourteen percent declined to purchase an item because of fears over how their data would be handled.

And adoption of good security habits is on the uptick: Duo Lab’s “2020 State of the Auth” report found more than half (53%) of respondents had used two-factor authentication (2FA), an increase from 28% two year prior. While most (71.5%) had experienced 2FA via SMS, more than one-third (36%) had used an authenticator app.

We live in a time when most people spend hours a day on their mobile devices to do their jobs, keep in touch with friends and family, schedule appointments, handle their finances, and complete myriad other tasks. As smartphones handle more of our data, the need to secure them grows.

There are several kinds of mobile apps to boost personal security and privacy, from password managers, to secure messaging apps, to anti-theft apps, and more. As a security pro, you may have your device locked down — but your family and friends may not know which steps they should be taking.

Read on to learn our recommendations for security- and privacy-focused iOS and Android apps. If you have a favorite that we missed, please feel free to it add in the Comments section, below.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

Recommended Reading:

Previous

1 of 9

Next

Comment |

Email This |

Print |

RSS

More Insights

The post 8 Security & Privacy Apps to Share With Family and Friends appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/8-security-privacy-apps-to-share-with-family-and-friends/?utm_source=rss&utm_medium=rss&utm_campaign=8-security-privacy-apps-to-share-with-family-and-friends

DOJ: Creep Coach Finagles Nude Athlete Photos

Allegedly perv college coach charged with cyberstalking and extorting nudes from his female athletes.
Read More

The post DOJ: Creep Coach Finagles Nude Athlete Photos appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/doj-creep-coach-finagles-nude-athlete-photos/?utm_source=rss&utm_medium=rss&utm_campaign=doj-creep-coach-finagles-nude-athlete-photos

623M Payment Cards Stolen from Cybercrime Forum

The database was subsequently leaked elsewhere, imperiling consumers from the U.S. and around the world.
Read More

The post 623M Payment Cards Stolen from Cybercrime Forum appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/623m-payment-cards-stolen-from-cybercrime-forum/?utm_source=rss&utm_medium=rss&utm_campaign=623m-payment-cards-stolen-from-cybercrime-forum

2021-04-09 – IcedID (Bokbot) infection from zipped JS file

The post 2021-04-09 – IcedID (Bokbot) infection from zipped JS file appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/2021-04-09-icedid-bokbot-infection-from-zipped-js-file/?utm_source=rss&utm_medium=rss&utm_campaign=2021-04-09-icedid-bokbot-infection-from-zipped-js-file

ESB-2021.1194 – [Win][UNIX/Linux][Debian] lib3mf: Execute arbitrary code/commands – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1194
                          lib3mf security update
                               9 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           lib3mf
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21772  

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00068.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running lib3mf check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4887-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 08, 2021                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : lib3mf
CVE ID         : CVE-2021-21772
Debian Bug     : 985092

A use-after-free was discovered in Lib3MF, a C++ implementation of the
3D Manufacturing Format, which could result in the execution of
arbitrary code if a malformed file is opened.

For the stable distribution (buster), this problem has been fixed in
version 1.8.1+ds-3+deb10u1.

We recommend that you upgrade your lib3mf packages.

For the detailed security status of lib3mf please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lib3mf

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=AmSX
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=OUEh
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1194 – [Win][UNIX/Linux][Debian] lib3mf: Execute arbitrary code/commands – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/esb-2021-1194-winunix-linuxdebian-lib3mf-execute-arbitrary-code-commands-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1194-winunix-linuxdebian-lib3mf-execute-arbitrary-code-commands-remote-unauthenticated

ESB-2021.1191 – [Win][UNIX/Linux] Nessus Agent: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1191
             Nessus Agent 8.2.4 Fixes Multiple Vulnerabilities
                               9 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Nessus Agent
Publisher:         Tenable
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service              -- Remote with User Interaction
                   Provide Misleading Information -- Remote/Unauthenticated      
                   Access Confidential Data       -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3450 CVE-2019-16168 

Reference:         ESB-2021.1127
                   ESB-2021.1075

Original Bulletin: 
   https://www.tenable.com/security/tns-2021-08

- --------------------------BEGIN INCLUDED TEXT--------------------

Nessus Agent 8.2.4 Fixes Multiple Vulnerabilities

Medium

Synopsis

Nessus Agent leverages third-party software to help provide underlying
functionality. Two separate third-party components (OpenSSL and sqlite) were
found to contain vulnerabilities, and updated versions have been made available
by the providers.

Out of caution and in line with good practice, Tenable opted to upgrade the
bundled libraries to address the potential impact of these issues. Nessus Agent
8.2.4 will update OpenSSL to version 1.1.1k and sqlite to version 3.34.1 to
address the identified vulnerabilities.

Solution

Tenable has released Nessus Agent 8.2.4 to address these issues. The
installation files can be obtained from the Tenable Downloads Portal 
( https://www.tenable.com/downloads/nessus-agents ).

This page contains information regarding security vulnerabilities that may
impact Tenable's products. This may include issues specific to our software, or
due to the use of third-party libraries within our software. Tenable strongly
encourages users to ensure that they upgrade or apply relevant patches in a
timely manner.

Tenable takes product security very seriously. If you believe you have found a
vulnerability in one of our products, we ask that you please work with us to
quickly resolve it in order to protect customers. Tenable believes in
responding quickly to such reports, maintaining communication with researchers,
and providing a solution in short order.

For more details on submitting vulnerability information, please see our 
Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email  

Risk Information

CVE ID: CVE-2019-16168
CVE-2021-3450
Tenable Advisory ID:
TNS-2021-08
Risk Factor:
Medium
CVSSv2 Base / Temporal Score:
4.3 / 3.6 (CVE-2019-16168)
5.8 / 4.8 (CVE-2021-3450)
CVSSv2 Vector:
(AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)(CVE-2019-16168)
(AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C)(CVE-2021-3450)

Affected Products

Nessus Agent 8.2.1 through 8.2.3 (OpenSSL)
Nessus Agent 8.2.3 and earlier (sqlite)

Advisory Timeline

2021-04-8 - [R1] Initial Release

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mKzr
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1191 – [Win][UNIX/Linux] Nessus Agent: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/esb-2021-1191-winunix-linux-nessus-agent-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1191-winunix-linux-nessus-agent-multiple-vulnerabilities

ESB-2021.1192 – [Ubuntu] lxml: Cross-site scripting – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1192
                      USN-4896-2: lxml vulnerability
                               9 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           lxml
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-28957  

Reference:         ESB-2021.1099
                   ESB-2021.1081

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-4896-2

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4896-2: lxml vulnerability
08 April 2021

lxml could allow cross-site scripting (XSS) attacks.
Releases

  o Ubuntu 14.04 ESM

Packages

  o lxml - pythonic binding for the libxml2 and libxslt libraries

Details

USN-4896-1 fixed a vulnerability in lxml. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that lxml incorrectly handled certain HTML attributes. A
remote attacker could possibly use this issue to perform cross-site
scripting (XSS) attacks.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 14.04

  o python3-lxml - 3.3.3-1ubuntu0.2+esm3
  o python-lxml - 3.3.3-1ubuntu0.2+esm3

In general, a standard system update will make all the necessary changes.

References

  o CVE-2021-28957

Related notices

  o USN-4896-1 : python-lxml, python3-lxml, lxml

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lGLd
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1192 – [Ubuntu] lxml: Cross-site scripting – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/esb-2021-1192-ubuntu-lxml-cross-site-scripting-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1192-ubuntu-lxml-cross-site-scripting-remote-with-user-interaction

Network Security News Summary for Friday April 9th, 2021

Ransomware Prototype; HTML Lego; Azure Functions Vuln; Cisco SMB Router Patches;

Simple Powershell Ransomware Creating a 7Z Archive of your Files
https://isc.sans.edu/forums/diary/Simple+Powershell+Ransomware+Creating+a+7Z+Archive+of+your+Files/27286/

HTML Lego: Hidden Phishing at Free JavaScript Site
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/html-lego-hidden-phishing-at-free-javascript-site/

Royal FLush: Privilege Escalation Vulnerability in Azure Functions
https://www.intezer.com/blog/cloud-security/royal-flush-privilege-escalation-vulnerability-in-azure-functions/

Cisco Small Business Router Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm

Google Chrome Blocking Port 10080
https://github.com/whatwg/fetch/issues/1191#issuecomment-797659444

keywords: google; chrome; 10080; cisco; smb; router; royal flush; azure; functions; html; phishing; javascript; powershell; ransomware; 7zip

The post Network Security News Summary for Friday April 9th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/network-security-news-summary-for-friday-april-9th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-friday-april-9th-2021

nzyme – Free & Open WiFi Defense System – Lennart Koopmann – PSW #690

Nzyme is a new kind of WiFi IDS (WIDS) that detects adversaries by looking at hard to spoof characteristics of an attacker. Existing WIDS tend to look at extremely easy to spoof metadata like channels or BSSIDs. The new approach of nzyme looks at hardware fingerprints and physical attributes like signal strengths. For example, it constantly tries to follow the signal “track” of every WiFi access point in range and alerts once a second track appears because this is most likely someone spoofing the legitimate access point from a different location.

Segment Resources:
https://www.nzyme.org/

Visit https://www.securityweekly.com/psw for all the latest episodes!

Show Notes: https://securityweekly.com/psw690

The post nzyme – Free & Open WiFi Defense System – Lennart Koopmann – PSW #690 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/09/nzyme-free-open-wifi-defense-system-lennart-koopmann-psw-690/?utm_source=rss&utm_medium=rss&utm_campaign=nzyme-free-open-wifi-defense-system-lennart-koopmann-psw-690

Thursday, April 8, 2021

What is Cyber Risk?

The discouraging numbers continue to grow as the latest high-profile breaches make headlines. Another corporate giant crumbles with …

The post What is Cyber Risk? appeared first on Hyperproof.

The post What is Cyber Risk? appeared first on Security Boulevard.

Read More

The post What is Cyber Risk? appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/what-is-cyber-risk/?utm_source=rss&utm_medium=rss&utm_campaign=what-is-cyber-risk

Protecting High-Level Personnel from IMSI Catchers

In September 2019, attribution was given to Israel for the IMSI catchers discovered in Washington, D.C. two years earlier, shining light on the prevalence of these types of spying devices. Once used solely by law enforcement as a way of finding the international mobile subscriber identity (IMSI) linked to a criminal suspect’s SIM card for investigative purposes, now just about anyone can acquire or build an IMSI catcher to intercept a target’s communications. With such low barriers to entry, it’s no longer just the bad guys who need to be worried about these devices.

The post Protecting High-Level Personnel from IMSI Catchers appeared first on Security Boulevard.

Read More

The post Protecting High-Level Personnel from IMSI Catchers appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/protecting-high-level-personnel-from-imsi-catchers/?utm_source=rss&utm_medium=rss&utm_campaign=protecting-high-level-personnel-from-imsi-catchers

Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own

White-hat hacking event shows yet again why there’s no such thing as foolproof security against modern attacks.

The post Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/zoom-joins-microsoft-teams-on-list-of-enterprise-tools-hacked-at-pwn2own-2/?utm_source=rss&utm_medium=rss&utm_campaign=zoom-joins-microsoft-teams-on-list-of-enterprise-tools-hacked-at-pwn2own-2

Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own

White-hat hacking event shows yet again why there’s no such thing as foolproof security against modern attacks.

A pair of security researchers at the virtual Pwn2Own hacking contest Wednesday exploited a combination of three individual zero-day bugs in the Zoom client to show how attackers could gain complete remote control of any PC or notebook computer on which the video communications software is installed.

The exploit came barely a day after another researcher at Pwn2Own demonstrated code execution on Microsoft Teams, which, like Zoom, has seen a surge in use since the global COVID-19 pandemic forced an increase in remote work at many organizations. The two exploits — and several others against Microsoft Exchange Server, Windows 10, and other technologies — have served as a further reminder of just how vulnerable some core enterprise software and communication products are to modern attacks.

“One of the biggest trends we see is that the participants continue to evolve and adapt to the targets,” says Brian Gorenc, senior director of vulnerability research and head of ZDI at Trend Micro, which organizes the event each year. “Even as vendors make exploitation more difficult, contestants find a path to win.”

The Zoom exploit garnered security researchers Daan Keuper and Thijs Alkemade of Dutch firm Computest Security an award of $200,000 and 20 so-called Master of Pwn points. Their exploit involved chaining together three bugs in the Zoom messenger client to gain code execution on a target system, without the user have to click or do anything. A Computest statement describes the exploit as giving the two researchers control to execute actions on the device running the Zoom client, such as turning on the camera and microphone, reading emails and screen content, and downloading browser history. All of the actions could be taken without the user having to do anything or even noticing the activity.

Unlike previously disclosed vulnerabilities in the Zoom app that mostly allowed for attackers to snoop on video calls, the newly discovered ones are more serious because they give threat actors a way to take over the entire system, Computest said.

The Zoom exploit was one of several high-profile exploits at a Pwn2Own event where some $1.5 million is up for grabs to security researchers who can find and demonstrate exploitable vulnerabilities in a selected list of products across seven categories. Target products included Microsoft Exchange Server and SharePoint under the server category; Teams and Zoom in the enterprise communications section; Microsoft Edge, Google Chrome, and Apple Safari in the browser category; and Adobe Reader and Microsoft Office 365 ProPlus under the enterprise applications category. In a sign of the times, Tesla’s Model 3 car was also one of the targets available to researchers.

The annual Pwn2Own contest was launched in 2007 and is part of the CanSecWest security conference. Over the years, the event has become a venue for some of the top white-hat hackers in the world to congregate and take a crack at widely used and popular technologies. The event has become a security proving ground of sorts for technology vendors and has been useful in helping them identify and close vulnerabilities they might have missed themselves. The organizers of Pwn2Own give vendors 90 days to fix vulnerabilities that are disclosed to them at the event.

“The contest has certainly grown and expanded over the last few years,” Gorenc says. “We’ve added categories for automobiles and enterprise communications while maintaining traditional targets like Web browsers and operating systems.”

Numerous Exploits
In the first two days of the three-day contest, security researchers from around the world punched holes in multiple widely used technologies and raked in tens of thousands of dollars in the process.

Jack Dates of RET2 Systems won $100,000 for exploiting an integer overflow error in Apply Safari and an out-of-bounds write issue to get kernel-level code execution. He picked up another $40,000 for combining three vulnerabilities in the Parallels Desktop virtualization software for Apple Macs to execute code on the underlying OS.

Dates’ Parallels Desktop exploit was one of two that involved the virtualization technology at this year’s Pwn2Own. On Thursday, security researcher Benjamin McBride of L3Harris Trenchant used a memory corruption bug in Parallels Desktop to escape the virtualization layer and execute code on the underlying OS. Like Dates, McBride earned $40,000 for his effort.

Researchers at DEVCORE Security Consulting, meanwhile, picked up $200,000 for showing how attackers could completely take over a Microsoft Exchange server by combining an authentication bypass vulnerability with a local privilege escalation issue in the technology. The discovery is sure to add to the already high concerns around Exchange server prompted by the recent disclosure of four critical zero-day bugs in the technology.

Independent security researcher OV demonstrated code execution on Microsoft Teams by combining a pair of bugs and was paid $200,000 for the effort. A team from Viettel Cyber Security earned $40,000 for showing how attackers could take advantage of an integer overflow bug in Windows 10 to escalate privileges from a regular user to a user with system-level privileges.

Bruno Keith and Niklas Baumstark from Dataflow Security exploited Google Chrome renderer and Microsoft Edge using the same exploit against both browser technologies and netted $100,000 as a reward for their work.

“The biggest takeaway so far is just the breadth of talent that comes to the competition,” Gorenc says. “It’s great to see the current art of exploitation in action against a variety of targets.”

The exploits targeting Microsoft Exchange Teams and Zoom have been the most significant so far, he says.

“We’ve already seen the impact Exchange bugs have on enterprises this year, so finding and fixing these bugs before they are used by attackers is huge,” Gorenc notes.

Similarly, Microsoft Teams and Zoom are nearly ubiquitous. But there hasn’t been a lot of research done on their security.

“Getting researchers to focus their interest here provides the vendors a great resource in resolving these vulnerabilities before they can be used by adversaries,” Gorenc says.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/zoom-joins-microsoft-teams-on-list-of-enterprise-tools-hacked-at-pwn2own/?utm_source=rss&utm_medium=rss&utm_campaign=zoom-joins-microsoft-teams-on-list-of-enterprise-tools-hacked-at-pwn2own

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...