Syntax Bearror

Top Menu

  • Home
  • PowerShell Resource
  • SpiceWorld 2019 Resources
  • Contact Us
  • About Us

Main Menu

  • Home
  • Blog
  • IT Guides
  • How-To’s
  • IT Fixes
  • Cybersecurity
  • Reviews
  • Home
  • PowerShell Resource
  • SpiceWorld 2019 Resources
  • Contact Us
  • About Us

logo

Header Banner

Syntax Bearror

  • Home
  • Blog
  • IT Guides
  • How-To’s
  • IT Fixes
  • Cybersecurity
  • Reviews
Bear Security
Home›Bear Security›Bear Security – Security News for the Week of July 12th, 2021

Bear Security – Security News for the Week of July 12th, 2021

By Christopher
July 12, 2021
3316
0
Share:
Collage Photo Representing Story

These are the stories that relate to our careers, clients, and businesses in the cybersecurity world for the Week of July 12th, 2021. Watch this in video form over on YouTube, or you can listen on the go with the Bear Security podcast.

Kaseya Releases Patches for VSA to Address Multiple Zero-Day

Kaseya has released a patch related to the REvil ransomware assault on their customer base that used their VSA Software, but it contained more than just a fix for the authentication bypass. The patch was published late Sunday, and it addresses a number of vulnerabilities including a credentials leak and business logic flaw, cross-site scripting, 2FA bypass, issues with the secure flag not being used on session cookies, addressing API responses that would contain a password hash, and a vulnerability that allows unauthorized uploads to the file server.

In addition to these fixes, users will be forced to change their passwords, and various features are being limited or disabled. If you use Kaseya’s VSA software as part of your managed services offering, you’ll definitely want to get up to speed on all the changes before deploying the patch. These changes will also impact users of Kaseya’s SaaS version of VSA.

Learn all about the patch and what you need to know by reviewing the Kaseya KB.

PrintNightmare Patch Released, Registry Keys Required

We reported on Friday that Microsoft’s PrintNightmare patch was released, though it comes with a few requirements. Installation of the patch is not sufficient on its own. Similar to other major vulnerabilities, there are three registry keys that need to be created and set, which impact the Point and Print functionality. These settings limit printer driver installation to Domain or System Administrators unless they are signed, and push for UAC to prompt on driver installations and changes. Also, verify that UAC is enabled to ensure the proper functionality of the controls.

You should of course test the patch if you can prior to deploying it, as some administrators and users have found that Zebra printers stop working after the patch has been installed. Other user issues seem to be resolved by reinstalling the printer as an Administrator.

Read the full update over on our blog.

Kaseya VSA Users Being Targeted in Fraudulent Email Campaign

If the ransomware incident wasn’t enough already for Kaseya VSA customers, a new malicious email campaign is the next thing looking to exploit them according to Windows Central. The campaign, detailed by Malwarebyte’s Threat Intelligence Team, attempts to take advantage of users by asking them to install a security update via email claiming to have been published by Microsoft. The emails seem to contain an attachment called SecurityUpdates.exe, but also direct’s users to download an additional payload from a website, both of which contain CobaltStrike malware.

With thousands of businesses still recovering from the ransomware incident with Kaseya, this is one more thing people need to worry about. Users are encouraged to only visit the official Kaseya site, www.kaseya.com for details surrounding any updates and for patches as mentioned earlier in the show.

You can read the full story over on Windows Central, or check out the Twitter thread from Malwarebytes Threat Intelligence.

Hackers Find a New Way to Disable Macro Security Warnings in Microsoft Office

The Hacker News is reporting that McAfee Labs has discovered a new method by which the ZLoader malware is being delivered. The method involves the delivery of a phishing email that contains a Microsoft Word document that, when opened, downloads a password-protected Excel file from a remote server. From there, Word reads cells from the XLS to assemble the macro’s code, followed by disabling the Excel Macro Warning in the registry. After which, the malicious macro function is run, it downloads the ZLoader payload, and then executes it under RunDLL32.exe.

Now, it is important to note that by default, macros are disabled in Word to attempt to avoid this common exploitation method, but depending on the configuration of your environment, this may not be the case. Additionally, the delivered Word document often contains language intended to lure users into enabling macro’s if the option is available to them, which then triggers the infection.

You can read the full story over on The Hacker News or the full research including screenshots over at McAfee Labs.

Insurance Firms Form Collective to Address Cyber Risks

Cyberscoop is reporting that in the past few weeks, insurers have joined together to address the growing issues and concerns around ransomware and cyber attacks. The first significant event came from the top seven insurance companies forming CyberAcuView back in Mid-June. CyberAcuView is a company intended to combine the insurance firm’s data collection and analysis efforts to assist in strengthening their risk mitigation. The second came last week from the American Property Casualty Insurance Association or APCIA, which released their guiding principles and their view on regulation related to cyber extortion and ransomware.

Both these actions come as credit agency AM Best warned of a “grim” cyber insurance market with the average growth of claims having been more than 39% and that ransomware now accounts for 75% of claims. Through both these actions, insurers are hoping to improve the data by which law enforcement, the government, and insurers have to understand losses and improve overall risk mitigation.

You can read the full story over on Cyberscoop, check out the APCIA’s Guiding Principles, or visit the website for CyberAcuView.

Stories Not Included in This Week’s Episode

  • Dark Reading has an interesting story on how attacks on Kaseya VSA went from breach to infection in under two hours.
  • AT&T Alien Labs has published research related to the evolution and TTPs of the Lazarus campaign.
  • Sophos has acquired Capsule8.
  • Buck Woody and David Seis have posted a workshop on GitHub of tools and processes to bolster business computer security.

That’s all for this week’s security news. Come back every Monday morning for the next rendition or check it out over on YouTube or on podcast. Stay safe out there friends.

Part of this week’s photo by Tima Miroshnichenko from Pexels

TagsAPCIACyber InsuranceCyberAcuViewKaseya VSAMacrosMcAfee LabsPrintNightmareRansomwareREvilZebra PrintersZLoader
Previous Article

PrintNightmare Part III – Patching and Remediation ...

Next Article

Bear Security – Security News for the ...

Share:

Christopher

Christopher Clai is a Senior Security Engineer, IT Generalist, and Developer from Chicago, IL with over 20 years of experience in Information Technology ranging from small businesses to Fortune 500's. Chris loves the Pacific Northwest, Sushi, Invader Zim, Rugby, World of Warcraft, raves, and is an avid user of Microsoft and Linux-based technologies.

Related articles More from author

  • Colorado Flag Waving
    Bear Security

    Bear Security – Security News for the Week of July 19th, 2021

    July 19, 2021
    By Christopher
  • Collage of Hundred Dollar Bills and Bitcoin Coins in Silver and Gold
    Bear Security

    Bear Security – Security News for the Week of July 26th, 2021

    July 26, 2021
    By Christopher
  • Bear Security

    Bear Security – Security News for Week of April 24th, 2021

    April 24, 2021
    By Christopher
  • Green Code on Laptop Screen with Hand on Keyboard
    Bear Security

    Bear Security – Security News for Week of June 19th, 2021

    June 20, 2021
    By Christopher
  • Blog

    PrintNightmare Part II – Print Spooler Remains Vulnerable Across Windows

    July 3, 2021
    By Christopher
  • Bear Security

    Bear Security – Security News for the Week of July 5th, 2021

    July 5, 2021
    By Christopher

Leave a reply Cancel reply

  • Cybersecurity

    Will Android Ever Be Ready for the Enterprise?

  • IT Fixes

    Taking Control of Your Netwrix Auditor Services with PowerShell

  • IT Fixes

    How to Avoid Frustration With Microsoft Intune MDM on Workstations

Follow Us on Social

See the Syntax at These Events

All appearances for 2020 have been cancelled due to COVID-19. Stay safe out there and see you all at events in 2021!

Like This Content?

Help Sytnax Bearror create more content, videos, podcasts, scripts, and more by contributing to our caffiene and technology addictions.

Subscribe to our Patreon

Buy Us a Coffee

Most Popular

IT Fixes

Fixing APC PowerChute Personal Edition Not Detecting UPS on Windows 10

  • Dell Laptops Showing “Press Power Button and Volume Down to Login”

    By Christopher
    September 13, 2019
  • How to Root AT&T Samsung S5 G900A (Up to Lollipop 5.0)

    By Christopher
    May 21, 2015
  • PrintNightmare Part II – Print Spooler Remains Vulnerable Across Windows

    By Christopher
    July 3, 2021
  • Picture of Service Listing with Print Spooler in Center

    Disable Print Spooler on Domain Controllers (If You Can)

    By Christopher
    June 30, 2021

Latest Tweets

  • T

    7 hours ago

Categories

Bear Security Blog Cybersecurity How To's IT Fixes Reviews

Copyright Statement

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
©2014 - 2021 - SyntaxBearror.io. All rights reserved unless otherwise noted.