Syntax Bearror

Top Menu

  • Home
  • PowerShell Resource
  • SpiceWorld 2019 Resources
  • Contact Us
  • About Us

Main Menu

  • Home
  • Blog
  • IT Guides
  • How-To’s
  • IT Fixes
  • Cybersecurity
  • Reviews
  • Home
  • PowerShell Resource
  • SpiceWorld 2019 Resources
  • Contact Us
  • About Us

logo

Header Banner

Syntax Bearror

  • Home
  • Blog
  • IT Guides
  • How-To’s
  • IT Fixes
  • Cybersecurity
  • Reviews
Bear Security
Home›Bear Security›Bear Security – Security News For Week of May 15th, 2021

Bear Security – Security News For Week of May 15th, 2021

By Christopher
May 15, 2021
2318
0
Share:
Frag Attack Icon

These are the stories that relate to our careers, clients, and businesses in the cybersecurity world for the Week of May 15th, 2021. Watch this in video form over on YouTube, or you can listen on the go with the Bear Security podcast.

Executive Order on Cybersecurity Official

It’s official. President Joe Biden signed an executive order on Wednesday aimed at charting a new course to improve the nation’s cybersecurity and protect Federal Government networks. The order aims to remove barriers to threat information sharing between the government and private sector such as requiring IT service providers to share certain breach information should it potentially impact government networks. It seeks to modernize and implement stronger cybersecurity standards in the Federal Government by moving toward cloud services, a zero-trust architecture, requiring MFA, and mandatory encryption. It seeks to establish baseline security standards for the development of software that is sold to the Federal Government, and improve the visibility of issues.  The order also establishes the Cybersecurity Safety Review Board which will be modeled after the National Transportation Safety Board, to be co-chaired by government and private sector leads, that may convene after a significant cyber incident to understand what happened, and make recommendations on improvements. Lastly, it requires the Federal Government to create a standardized playbook and set of definitions for incident response to help reduce complexities and establish a baseline of response. This would be further bolstered through improved investigative and remediation capabilities by requiring government-wide Endpoint Detection and Response (EDR) along with robust intra-governmental information sharing.

It’s a good start toward what could become a model for the private market in the future, depending on the success of its execution and maintenance. Read the full executive order over on WhiteHouse.gov.

Vulnerability Affects Wi-Fi Devices As Far Back as 1997

If you thought Dell’s 12 year long vulnerability was bad, how about a flaw as old as the original Wi-Fi standard itself, from 1997? Wired is reporting that a set of vulnerabilities were disclosed this week by New York University Abu Dhabi researcher Mathy Vanhoef, that an attacker within Wi-Fi range of a target network could potentially exfiltrate data from a victim and compromise their devices. The findings were collectively called “Frag Attack”, short for “Fragmentation and aggregation attack” due to how the flaws relate to how data is processed with Wi-Fi. Though, don’t go unplugging things just yet. Vahoef says that while the flaws are widespread, they are currently difficult to exploit, but stay on the lookout for patches for your devices, especially routers and Wireless Access Points.

You can learn more about Frag Attack from the Wired story, or from the researcher’s site dedicated to the vulnerabilities they discovered.

Colonial Pipeline Paid $5 Million Ransom, Now RaaS Group DarkSide Has Disappeared?

The register is reporting that Colonial Pipeline’s operators reportedly paid $5 million to regain control of their digital systems to restore gas and oil deliveries across the eastern seaboard of the United States, following last week’s ransomware infection by the group DarkSide. Meanwhile, due to how slow the decryptor was, Colonial continued recovering from backups as well in an attempt to speed up the restoration. The pipeline’s service resumed Thursday, and they expect it to take up to two weeks to get back to full operation. Meanwhile, DarkSide had also received a $4.4 million ransom from chemical distributor Brenntag who they also hit around the same time. Though here is where the story gets even more interesting. DarkSide and other ransomware groups, after realizing that someone hit a hornet’s nest, decided to set some rules around their Ransomware as a Service, and some hacking forums now prohibiting the marketing of locker-type malware and services. Then on Friday, Bleeping Computer reported that a threat actor known as UNKN, who is considered the public-facing representative of the rival ransomware gang REvil, shared that allegedly DarkSide lost access to their public data leak site, payment servers, and CDN servers due to law enforcement action. Though no law enforcement agency has made mention of action so far, leading to speculations that this may be an exit scam. Expect more updates on this story.

Read the details on the ransom payment over on the Register, or the details around DarkSide’s disappearance over on BleepingComputer.

On a lighter note, I couldn’t help but think of this band called AKADO and their song DARKSIDE every time I heard of the group this past two weeks. So if you dig rock music, maybe check out their music video for DARKSIDE. 

This Month’s Patch Tuesday for Microsoft Includes a Wormable RCE in the HTTP Stack

Talos published a blog this week covering their insight over the recent patches published on Tuesday by Microsoft. The most significant vulnerability in this month’s updates is a Remote Code Execution vulnerability in the HTTP protocol stack. This vulnerability would allow an unauthenticated attacker to send a specially crafted packet to a target server that, if successful, gives an attacker the ability to execute remote code on the target host. Microsoft believes this vulnerability could be wormable, and with a CVSS score of 9.8 / 10, this is one you’ll want to patch quickly.

If you aren’t hosting HTTP websites, then you may want to be concerned about another RCE, this time in Internet Explorer 11. This RCE can be exploited by getting a vulnerable user to visit a specially crafted website, or open an embedded Microsoft Office document. The last significant critical vulnerability as part of this patch Tuesday has to do with the OLE Automation protocol, which is an inter-process communication mechanism relied on by a number of programming languages. This vulnerability could allow an attacker to execute remote code on a targeted machine without any interaction.

Read the full writeup over on Talos’s Blog, or check out the Microsoft Security Update Guide if you’re into reading hardcore CVE information.

6 Month Old Zero-Day in Cisco AnyConnect Patched

Bleeping Computer is reporting that Cisco has fixed a six-month-old zero-day vulnerability that was found in the Cisco AnyConnect Secure Mobility Client VPN software, with publicly available proof-of-concept exploit code. The zero-day was disclosed back in November 2020 with Cisco only offering mitigation measures to decrease the attack surface at the time. The Cisco Product Security Incident Response Team has said despite proof-of-exploit code being made available, they don’t currently see evidence of attackers exploiting it in the wild. In addition to resolving the zero-day, the new versions also introduce new settings that are strongly recommended for increased protection that administrators should check out.

The vulnerability and improvements are now addressed in Cisco AnyConnect Secure Mobility Client releases 4.10.000093 and later. Read the full story over on Bleeping Computer.

Apple’s ‘Find My’ Network is Exploitable Via Bluetooth

Threatpost is reporting that Apple’s ‘Find My Device’ function that helps users track their iOS and macOS devices, can be exploited to transfer data to and from random passing devices without using the internet. Security Researched Fabian Bräunlein with Positive Security developed a proof of concept for the attack, which uses a microcontroller and a custom macOS app that can broadcast data from one device to another via Bluetooth Low Energy. Then, once the receiving device connects to the internet, it will then forward data to an attacker-controlled Apple iCloud server. The research dubbed the method “Send My” and detailed several use cases for the method.  Bräunlein mentioned the misuse of Find My in this way may be nearly impossible for Apple to prevent given the capability is “inherent to the privacy and security-focused design of the Find My offline finding system”.

View the researcher’s blog or the full story over on Threatpost.

Researchers Find 19 Petabytes of Data in Unprotected Databases

CyberNews researchers have found that more than 29,000 databases worldwide are unprotected and publically accessible leaving nearly 19 Petabytes of data exposed to anybody. While they don’t mention the data discovered, Hadoop databases had the largest amount of data exposed and the countries with the most unprotected databases online are topped by China, followed by the United States.

See the full research over at CyberNews.


Story Updates From Prior Episodes…

Rapid7 Source Code Accessed as part of Codecov

The Hacker News is reporting that Rapid7 revealed on Thursday that they were affected by the Codecov breach. Rapid7 joins HashiCorp, Confluent, and Twilio, as companies continue to assess the potential that they were breached. Rapid7 says on their website that the use of Codecov’s bash uploader script was limited to a single CI server used to test and build some internal tooling for their Managed Detection and Response (MDR) service. They were not using Codecov on any CI server used for product code. In addition, they have not found evidence of any other system being accessed and they’ve already reached out to any customers whose dataset may have been used as part of the CI system.

The Federal Government is also engaged in investigating the Codecov breach, and it’ll be months before we know the full extent of all the customers that have been impacted. We’ll keep you updated as we learn more.

Read the full story on The Hacker News or the blog disclosure by Rapid7 .

One last thing… A correction! Last week on the YouTube / Podcast version, I referred to NIST as the National Institute of Science and Technology. It’s actually the National Institute of Standards and Technology. I don’t know where my brain was when I wrote the script, so my apologies! Speaking of which, the comment period regarding the HIPAA guidance remains open, so if you are involved in HIPAA at your workplace, be sure to give your feedback to NIST.

That’s all for this week’s security news. Come back every Saturday for the next rendition or check it out over on YouTube or on podcast. Have a good week everyone!

TagsAppleCiscoCisco AnyConnectCodecovColonial PipelinecybersecurityDarkSideData LeaksExecutive OrderFrag AttackMicrosoftPatch TuesdayRansomwareRapid7REvilWi-Fi
Previous Article

Bear Security – Security News for Week ...

Next Article

New Section – IT Guides!

Share:

Christopher

Christopher Clai is a Senior Security Engineer, IT Generalist, and Developer from Chicago, IL with over 20 years of experience in Information Technology ranging from small businesses to Fortune 500's. Chris loves the Pacific Northwest, Sushi, Invader Zim, Rugby, World of Warcraft, raves, and is an avid user of Microsoft and Linux-based technologies.

Related articles More from author

  • Blog

    The Growing Issue of Spam for Outlook.com Personal Accounts

    March 21, 2021
    By Christopher
  • Looking suspiciously at a Lemon Duck
    Bear Security

    Bear Security – Security News For Week of May 22nd, 2021

    May 22, 2021
    By Christopher
  • Looking Disappointed at a Dell Desktop
    Bear Security

    Bear Security – Security News for Week of May 8th, 2021

    May 8, 2021
    By Christopher
  • Green Code on Laptop Screen with Hand on Keyboard
    Bear Security

    Bear Security – Security News for Week of June 19th, 2021

    June 20, 2021
    By Christopher
  • Bear Security

    Bear Security – Security News for Week of June 12th, 2021

    June 12, 2021
    By Christopher
  • Bear Security

    Bear Security – Security News for Week of May 29th, 2021

    May 29, 2021
    By Christopher

Leave a reply Cancel reply

  • Screenshot of Windows Background
    IT Fixes

    Realtek Audio Glitches on Windows Insider Builds 18965 and 18970

  • Blog

    MSPs Using Kaseya VSA Find Themselves Distributing Ransomware

  • Reviews

    Review of the Harmon Kardon Invoke – Powered by Cortana

Follow Us on Social

See the Syntax at These Events

All appearances for 2020 have been cancelled due to COVID-19. Stay safe out there and see you all at events in 2021!

Like This Content?

Help Sytnax Bearror create more content, videos, podcasts, scripts, and more by contributing to our caffiene and technology addictions.

Subscribe to our Patreon

Buy Us a Coffee

Most Popular

IT Fixes

Fixing APC PowerChute Personal Edition Not Detecting UPS on Windows 10

  • Dell Laptops Showing “Press Power Button and Volume Down to Login”

    By Christopher
    September 13, 2019
  • How to Root AT&T Samsung S5 G900A (Up to Lollipop 5.0)

    By Christopher
    May 21, 2015
  • PrintNightmare Part II – Print Spooler Remains Vulnerable Across Windows

    By Christopher
    July 3, 2021
  • Picture of Service Listing with Print Spooler in Center

    Disable Print Spooler on Domain Controllers (If You Can)

    By Christopher
    June 30, 2021

Latest Tweets

  • T

    7 hours ago

Categories

Bear Security Blog Cybersecurity How To's IT Fixes Reviews

Copyright Statement

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
©2014 - 2021 - SyntaxBearror.io. All rights reserved unless otherwise noted.