OSN August 9, 2021

Fortify Security Team
Aug 9, 2021

Title: Synology Warns of Malware Infecting NAS Devices with Ransomware
Date Published:ย  August 9, 2021

https://www.bleepingcomputer.com/news/security/synology-warns-of-malware-infecting-nas-devices-with-ransomware/

Excerpt:ย  โ€œTaiwan-based NAS maker Synology has warned customers that the StealthWorker botnet is targeting their network-attached storage devices in ongoing brute-force attacks that lead to ransomware infections.ย  According to Synology’s PSIRT (Product Security Incident Response Team), Synology NAS devices compromised in these attacks are later used in further attempts to breach more Linux systems.ย  “These attacks leverage a number of already infected devices to try and guess common administrative credentials, and if successful, will access the system to install its malicious payload, which may include ransomware,” Synology said in a security advisory.”

Title: Australian Govt Warns of Escalating LockBit Ransomware Attacks
Date Published:ย  August 8, 2021

https://www.bleepingcomputer.com/news/security/australian-govt-warns-of-escalating-lockbit-ransomware-attacks/

Excerpt:ย  โ€œThe Australian Cyber Security Centre (ACSC) warns of an increase of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021.ย  “ACSC has observed an increase in reporting of LockBit 2.0 ransomware incidents in Australia,” Australia’s cybersecurity agency said in a security alert issued on Thursday.ย  According to the agency, LockBit victims also report threats of having data stolen during the attacks leaked online, a known and popular tactic among ransomware gangs to coerce their targets into paying the ransoms.โ€

Title: Microsoft Exchange Servers Scanned for ProxyShell Vulnerability, Patch Now
Date Published:ย  August 7, 2021

https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/

Excerpt: ย โ€œThreat actors are now actively scanning for the Microsoft Exchange ProxyShell remote code execution vulnerabilities after technical details were released at the Black Hat conference.ย  Before we get to the active scanning of these vulnerabilities, it is important to understand how they have been disclosed.ย  ProxyShell is the name for three vulnerabilities that perform unauthenticated, remote code execution on Microsoft Exchange servers when chained together.โ€

Title: Why Ransomware is Such a Threat to Critical Infrastructure
Date Published:ย  August 9, 2021

https://www.helpnetsecurity.com/2021/08/09/ransomware-threat-critical-infrastructure/

Excerpt:ย  โ€œA recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nationโ€™s critical infrastructure and the ease with which their systems can be breached.ย  Little more than a decade ago, what was considered critical infrastructure was largely limited to air traffic control and generation and transmission of energy, and security regulations have been tightly focused on these areas. Today, however, thereโ€™s a growing acknowledgment that infrastructure encompasses much more, from stormwater systems to garbage processors, telecom providers, hospitals, financial services, pipelines, and more.ย  Cyberattacks and ransomware pose a greater risk to critical infrastructure than a non-digital external threat like a nation-state does, and the size and scale of the infrastructure has little to do with the scope of the risk; ransomware is just as much as threat to a water treatment plant in downtown Smallville, USA, as it is to a large-scale energy grid or gasoline pipeline.โ€

Title: CVE-2021-20090 Actively Exploited to Target Millions of IoT Devices Worldwide
Date Published:ย  August 7, 2021

https://securityaffairs.co/wordpress/120908/hacking/cve-2021-20090-iot-attacks.html

Excerpt:ย  โ€œThreat actors actively exploit a critical authentication bypass vulnerability, tracked as CVE-2021-20090, impacting home routers with Arcadyan firmware to deploy a Mirai bot.ย  โ€œA path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.โ€ reads the advisory published by Tenable.ย  This flaw potentially affects millions of IOT devices manufactured by no less than 17 vendors, including some ISPs.ย  The ongoing attacks were spotted by researchers from Juniper Threat Labs, experts believe that were conducted by a threat actor that targeted IoT devices in a campaign since February.โ€

Title: 5 Ways to Stop Ransomware in its Tracks
Date Published:ย  August 9, 2021

https://www.infosecurity-magazine.com/blogs/5-ways-stop-ransomware-tracks/

Excerpt:ย  โ€œRansomware is now the most disruptive cyber threat facing global organizations, according to the CEO of the National Cyber Security Centre (NCSC). The scale of the problem is such that leaders at both the recent G7 and NATO conferences called on hostile nations such as Russia to take a harder line on the criminal groups theyโ€™re sheltering.ย  No organization is safe. From hospitals dealing with surges in COVID-19 cases to critical energy infrastructure in the US to UK train stations โ€” the only rule businesses must learn is that itโ€™s not a case of โ€œifโ€ but โ€œwhen.โ€ Attacks surged by 150% in 2020, with the average extortion amount doubling, according to some experts. This is down to three key factors: Ransomware-as-a-Service (RaaS) growth has lowered the barrier to entry for various affiliate groups. The large number of victim organizations choosing to pay extorters. Poor corporate cybersecurity.โ€

Title: NCSC Sticks by ‘Three Random Words’ Strategy for Passwords
Date Published:ย  August 9, 2021

https://www.infosecurity-magazine.com/news/ncsc-three-random-words-passwords/

Excerpt:ย  โ€œCombining three random words is more effective than using complex combinations for passwords, says the National Cyber Security Council (NCSC).ย  An NCSC blog post dated August 9 explains how this train of thought or โ€œthink randomโ€ helps to โ€œkeep the bad guys out.โ€ The post follows on from a previous one from nearly five years ago, โ€œThree random words or #thinkrandom.โ€ย  According to the post, enforcing โ€œcomplex requirementsโ€ for passwords is a poor defense against guessing attacks. This is because โ€œminds struggle to remember random character strings,โ€ and, being human, we use โ€œpredictable patternsโ€ to meet the required criteria.ย  Cyber hackers are all too familiar with this and use it to make their attacks more effective. According to Verizon, compromised passwords are responsible for 81 percent of hacking-related data breaches. ย  โ€œCounter-intuitively, the enforcement of these complexity requirements results in the creation of more predictable passwords,โ€ says the NCSC post. โ€œFaced with making yet another password with specific requirements, users fall back on variations of something they already know and use, falsely believing it to be strong because it satisfies password strength meters (and is accepted by online services).โ€

Title: Conti Ransomware Affiliate Goes Rogue, Leaks โ€œGang Dataโ€
Date Published:ย  August 6, 2021

https://nakedsecurity.sophos.com/2021/08/06/conti-ransomware-affiliate-goes-rogue-leaks-company-data/

Excerpt: ย โ€œAs you already know, many of todayโ€™s ransomware attacks arenโ€™t conducted by the core criminals who actually write the malware code.ย  The core crooks like to keep out of the limelight by recruiting โ€œaffiliatesโ€ to handle the actual network intrusions.ย  (These cybergangs often use regular business vocabulary, even referring to their victims as โ€œcustomersโ€ and describing their extortion attempts as โ€œnegotiationsโ€.)ย  In theory, affiliates can get really rich, because they typically get paid 70% of any ransom that gets extorted โ€“ and individual ransoms can run into millions of dollars these days.ย  And in practice, the core criminals โ€“ the ones who write the malware, operate the โ€œaffiliate systemโ€, and collect the Bitcoin blackmail payments โ€“ can get super-rich, because they get 30% of everything.ย  However, according to The Record, which published a screenshot of a post in a cybercrime forum by a user discussing the Conti ransomware crew: Yes, of course they recruit suckers and divide the money among themselves, and the boys are fed with what they will let them know when the victim pays.ย  The implication, clearly, is that affiliates in the Conti ransomware crew are not being paid 70% of the actual ransom amount, but 70% of an imaginary but lower number.โ€

Title: FTC: Phishing Campaign Targets Unemployment Benefits & PII
Date Published:ย  August 6, 2021

https://www.darkreading.com/attacks-breaches/ftc-phishing-campaign-targets-unemployment-benefits-pii

Excerpt: ย โ€œThe Federal Trade Commission (FTC) this week warned of a phishing campaign targeting victims’ unemployment insurance benefits and personally identifiable information (PII).ย  Malicious text messages claim that victims must “make necessary corrections” to their unemployment insurance claim, verify their personal information, or reactivate their UI benefits account. The texts include a link that redirects to a fake state workforce agency website, where victims are asked to enter site credentials and personal data such as a Social Security number.ย  “Fraudsters can use the information to file fraudulent UI benefits claims or for other identity theft,” officials wrote in a warning.โ€

Title: FragAttacks Foil 2 Decades of Wireless Security
Date Published:ย  August 6, 2021

https://www.darkreading.com/iot/fragattacks-foil-two-decades-of-wireless-security

Excerpt:ย  โ€œThe evolution of wireless security could at best be described as trial and error. The initial standard that debuted in the late 1990s โ€” Wired Equivalent Privacy (WEP) โ€” had significant security problems, and the first two version of Wireless Protected Access, WPA and WPA2, both have been found to be vulnerable to a variety of other security issues.ย  The trials continue with a host of so-called fragmentation attacks, or FragAttacks, that abuse the aggregation and fragmentation to allow machine-in-the-middle attacks. Details of the vulnerabilities, which have been kept secret for nine months, were disclosed at the Black Hat USA briefings on Aug. 5.ย  The issues occur in the way that small network packets are combined for transport, known as aggregation, or the way that large network packets are split up to improve reliability, known as aggregation. Even devices using WPA3, the latest wireless security standard, can be vulnerable, Mathy Vanhoef, a postdoctoral researcher at New York University Abu Dhabi, said during his Black Hat presentation.โ€

Recent Posts

June 10, 2022

Title: Bizarre Ransomware Sells Decryptor on Roblox Game Pass Store Date Published: June 9, 2022 https://www.bleepingcomputer.com/news/security/bizarre-ransomware-sells-decryptor-on-roblox-game-pass-store/ Excerpt: โ€œA new ransomware is taking the unusual approach of...

June 9, 2022

Title: New Symbiote Malware Infects all Running Processes on Linux Systems Date Published:ย June 9, 2022 https://www.bleepingcomputer.com/news/security/new-symbiote-malware-infects-all-running-processes-on-linux-systems/ Excerpt:ย โ€œA newly discovered Linux malware known...

June 8, 2022

Title:ย Surfshark, ExpressVPN pull out of India Over Data Retention Laws Date Published:ย June 7, 2022 https://www.bleepingcomputer.com/news/legal/surfshark-expressvpn-pull-out-of-india-over-data-retention-laws/ Excerpt:ย โ€œSurfshark announced today they are shutting down...

June 6, 2022

Title:ย Italian City of Palermo Shuts Down all Systems to Fend off Cyberattack Date Published:ย June 6, 2022 https://www.bleepingcomputer.com/news/security/italian-city-of-palermo-shuts-down-all-systems-to-fend-off-cyberattack/ Excerpt:ย โ€œThe municipality of Palermo in...

June 3, 2022

Title: Critical Atlassian Confluence Zero-Day Actively Used in Attack Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/critical-atlassian-confluence-zero-day-actively-used-in-attacks/ Excerpt: โ€œHackers are actively exploiting a new Atlassian...

June 2, 2022

Title: Conti Ransomware Targeted Intel Firmware for Stealthy Attacks Date Published: June 2, 2022 https://www.bleepingcomputer.com/news/security/conti-ransomware-targeted-intel-firmware-for-stealthy-attacks/ Excerpt: โ€œResearchers analyzing the leaked chats of the...

June 1, 2022

Title: Ransomware Attacks Need Less Than Four Days to Encrypt Systems Date Published: June 1, 2022 https://www.bleepingcomputer.com/news/security/ransomware-attacks-need-less-than-four-days-to-encrypt-systems/ Excerpt: โ€œThe duration of ransomware attacks in 2021...