OSN April 19, 2021

Fortify Security Team
Apr 19, 2021

Title: The FBI Removed Hacker Backdoors From Vulnerable Microsoft Exchange Servers. Not Everyone Likes the Idea

Date Published: April 19, 2021

https://www.zdnet.com/article/the-fbi-removed-hacker-backdoors-from-vulnerable-microsoft-exchange-servers-not-everyone-likes-the-idea/

Excerpt: “In this case, accessing the networks was deemed appropriate by the courts in order to remove backdoors planted by malicious hackers and to protect the organizations from cyberattacks – but Brumley fears what he described as a “slippery slope”. “We don’t want a future where the FBI determines someone may be vulnerable, and then uses that as a pretext to gain access. Remember: the FBI has both a law enforcement and intelligence mission. It would be the same as a police officer thinking your door isn’t locked, and then using that as a pretext to enter,” he says.”

Title: FIN7 Sysadmin Gets 10 Years Behind Bars

Date Published: April 19, 2021

https://www.infosecurity-magazine.com/news/fin7-sysadmin-gets-10-years-behind/

Excerpt: “Ukrainian national Fedir Hladyr, 35, was manager and sysadmin for FIN7 (aka Carbanak), which is believed to have made a fortune from targeting banks, restaurants, gambling and hospitality firms. The campaign which Hladyr has been linked to involved the compromise of thousands of computer systems internationally, including all 50 US states and the District of Columbia. According to court documents, the gang stole 20 million customer card records from over 6,500 individual point-of-sale (PoS) terminals at more than 3,600 separate business locations, causing billions in damages at firms including Chipotle Mexican Grill, Chili’s, Arby’s, Red Robin, and Jason’s Deli.”

Title: Nitro ransomware Demands Gift Codes as Ransom Payments

Date Published: April 19, 2021

https://securityaffairs.co/wordpress/116975/malware/nitroransomware-discord-gift-code.html

Excerpt: “In case the victims will not provide the Nitro gift code within three hours, the ransomware threatens to delete their encrypted files. In case the victims will provide a valid Nitro gift code URL, the ransomware will use a Discord API URL to verify it and then will use an embedded static decryption key to decrypt the files. The ransomware operators have chosen this payment method because it is quite easy for them to cash out by selling the Discord gift cards in the underground marketplaces and hacking forums.”

Title: Is Bazarloader Malware Linked to Trickbot Operators?

Date Published: April 18, 2021

https://securityaffairs.co/wordpress/116933/cyber-crime/bazarloader-malware-campaigns.html

Excerpt: “The phishing messages include links pointing to Slack or BaseCamp cloud storage, for this reason, they don’t raise suspicion when they are received by employees working at an organization that uses the above services. The URL could be also obfuscated by using a URL shortening service to hide the fact that it points to a file with an .exe extension. Upon clicking on the link, the BazarLoader malware will be downloaded and executed on the victim’s machine.”

Title: Microsoft Fixes Windows 10 Bug That Can Corrupt NTFS Drives

Date Published: April 17, 2021

https://www.bleepingcomputer.com/news/security/microsoft-fixes-windows-10-bug-that-can-corrupt-ntfs-drives/

Excerpt: “Threat actors could also use the bug to force a crash of a breached system to hide their activities. While the error generated by the bug stated the drive was corrupted, Microsoft clarified that volume was only marked as dirty, and a reboot and chkdsk would quickly mark it as clean. Unfortunately, in one of our and other people’s tests, chkdsk did not fix the issue, and Windows 10 refused to boot again.”

Title: 82% Data Has Been Left Unencrypted in Public Server in the Cloud

Date Published: April 19, 2021

https://medium.com/@marketing.dataspace/82-data-has-been-left-unencrypted-in-public-server-in-the-cloud-550d848fae00

Excerpt: “After analyzing more than 1 million cloud resources, processing 12 petabytes of network traffic, and dug for flaws in public cloud infrastructure, it has been found that 4.8 million records, including Personally Identifiable Information (PII) and Protected Health Information (PHI), were exposed because of the access control and encryption aren’t enforced in secure cloud service.”

Title: Mandiant Front Lines: How to Tackle Exchange Exploits

Date Published: April 16, 2021

https://threatpost.com/mandiant-microsoft-exchange-exploits/165439/

Excerpt: “This incident should serve as a wake-up call that information security is a responsibility for all of us, and we should do what we can to help as many people as we can, if we have the means. For organizations running Exchange Server but are currently in that “what do I do now?” phase, we’ve designed the following informative checklist. The purpose of this list is not to accuse or cast blame, but to inform.”

Title: Ryuk Ransomware Operation Updates Hacking Techniques

Date Published: April 16, 2021

https://www.bleepingcomputer.com/news/security/ryuk-ransomware-operation-updates-hacking-techniques/

Excerpt: “Among the newer techniques the researchers saw in Ryuk ransomware attacks was the use of KeeThief, an open-source tool for extracting credentials from KeePass password manager. KeeThief works by extracting key material (e.g. master password, key file) from the memory of a running KeePass process with an unlocked database. Another tactic was to deploy a portable version of Notepad++ to run PowerShell scripts on systems with PowerShell execution restriction, Kremez says.”

Title: Major BGP Leak Disrupts Thousands of Networks Globally

Date Published: April 17, 2021

https://www.bleepingcomputer.com/news/security/major-bgp-leak-disrupts-thousands-of-networks-globally/

Excerpt: “But, BGP is fragile, and any disruptions or anomalies in even a few intermediary systems can have a lasting impact on many. For the Internet to work, different devices (autonomous systems) advertise the IP prefixes they manage and the traffic they are able to route. However, this is largely a trust-based system with the assumption that every device is telling the truth. Given the massive interconnected nature of the Internet, it is hard to enforce honesty on every single device present on the network.”

Title: Critical RCE Can Allow Attackers to Compromise Juniper Networks Devices

Date Published: April 16, 2021

https://securityaffairs.co/wordpress/116907/security/juniper-networks-rce.html

Excerpt: “The flaw can be exploited by a remote, unauthenticated attacker to execute arbitrary code of a vulnerable device or to trigger a DoS condition. The vulnerability can be exploited by sending specially crafted packets to the targeted system. The flaw was reported by security researchers Nguyen Hoàng Thach, aka d4rkn3ss, from cybersecurity company STAR Labs. An attacker could trigger the flaw to install a backdoor on a vulnerable device or to change its configuration.”

Recent Posts

June 10, 2022

Title: Bizarre Ransomware Sells Decryptor on Roblox Game Pass Store Date Published: June 9, 2022 https://www.bleepingcomputer.com/news/security/bizarre-ransomware-sells-decryptor-on-roblox-game-pass-store/ Excerpt: “A new ransomware is taking the unusual approach of...

June 9, 2022

Title: New Symbiote Malware Infects all Running Processes on Linux Systems Date Published: June 9, 2022 https://www.bleepingcomputer.com/news/security/new-symbiote-malware-infects-all-running-processes-on-linux-systems/ Excerpt: “A newly discovered Linux malware known...

June 8, 2022

Title: Surfshark, ExpressVPN pull out of India Over Data Retention Laws Date Published: June 7, 2022 https://www.bleepingcomputer.com/news/legal/surfshark-expressvpn-pull-out-of-india-over-data-retention-laws/ Excerpt: “Surfshark announced today they are shutting down...

June 6, 2022

Title: Italian City of Palermo Shuts Down all Systems to Fend off Cyberattack Date Published: June 6, 2022 https://www.bleepingcomputer.com/news/security/italian-city-of-palermo-shuts-down-all-systems-to-fend-off-cyberattack/ Excerpt: “The municipality of Palermo in...

June 3, 2022

Title: Critical Atlassian Confluence Zero-Day Actively Used in Attack Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/critical-atlassian-confluence-zero-day-actively-used-in-attacks/ Excerpt: “Hackers are actively exploiting a new Atlassian...

June 2, 2022

Title: Conti Ransomware Targeted Intel Firmware for Stealthy Attacks Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/conti-ransomware-targeted-intel-firmware-for-stealthy-attacks/ Excerpt: “Researchers analyzing the leaked chats of the...

June 1, 2022

Title: Ransomware Attacks Need Less Than Four Days to Encrypt Systems Date Published: June 1, 2022 https://www.bleepingcomputer.com/news/security/ransomware-attacks-need-less-than-four-days-to-encrypt-systems/ Excerpt: “The duration of ransomware attacks in 2021...