More stories

  • in

    Microsoft September 2021 Patch Tuesday: Remote code execution flaws in MSHTML, OMI fixed

    Microsoft has released over 60 security fixes and updates resolving issues including a remote code execution (RCE) flaw in MSHTML and other critical bugs.The Redmond giant’s latest round of patches, usually released on the second Tuesday of each month in what is known as Patch Tuesday, landed on September 14.Products impacted by September’s security update include Azure Open Management Infrastructure, Azure Sphere, Office Excel, PowerPoint, Word, and Access; the kernel, Visual Studio, Microsoft Windows DNS, and BitLocker, among other software.  Read on: On September 7, Microsoft said a remote code execution flaw in MSHTML had been identified and was being used in a limited number of attacks against Windows systems. The zero-day vulnerability, tracked as CVE-2021-40444, has been resolved in this patch round and the firm is urging users to accept the security fix immediately. Some other notable vulnerabilities resolved in this update are: CVE-2021-38647: With a CVSS score of 9.8, this is the most critical bug on September’s list. This vulnerability impacts the Open Management Infrastructure (OMI) program and allows attackers to perform RCE attacks without authentication by sending malicious messages via HTTPS to port 5986.”Some Azure products, such as Configuration Management, expose an HTTP/S port for interacting with OMI (port 5986 also known as WinRMport),” Microsoft says. “This configuration where the HTTP/S listener is enabled could allow remote code execution. It is important to mention that most Azure services that use OMI deploy it without exposing the HTTP/S port.”CVE-2021-36968:  A publicly disclosed Windows DNS privilege escalation zero-day vulnerability, issued a CVSS score of 7.8. Microsoft has not found any evidence, as of yet, of exploitation in the wild.CVE-2021-26435: A critical flaw (CVSS 8.1) in the Microsoft Windows scripting engine. However, this memory corruption flaw requires user interaction to trigger.CVE-2021-36967: A vulnerability, deemed critical and issued a CVSS score of 8.0, in the Windows WLAN AutoConfig service which can be used for elevation of privileges. 

    According to the Zero Day Initiative (ZDI), the 66 CVEs — including three critical, one moderate, and the rest deemed important — reveal a volume slightly higher than the average patch rate across 2021, while this is still below 2020 volume. In addition, 20 CVEs were patched by Microsoft Edge (Chromium) earlier in September. In total, 11 of these vulnerabilities were submitted through the Zero Day Initiative, for a total of 86 CVEs.On Wednesday, Microsoft warned of “Azurescape,” a vulnerability mitigated by the Redmond giant that impacts Azure Container Instances (ACI). The bug was reported by a researcher from Palo Alto Networks. Last month, Microsoft resolved 44 vulnerabilities in the August batch of security fixes. In total, three were categorized as zero-day flaws, and 13 allowed attackers to perform RCE attacks. Included in the patch release was a fix for a well-publicized Windows Print Spooler vulnerability which could be weaponized for the purposes of local privilege escalation.A month prior, the tech giant tackled 117 bugs during the July Patch Tuesday.In other security news, Apple has patched a zero-day vulnerability reportedly exploited by NSO Group to spy on users of Mac, iPhone, iPad, and Watch products. In addition, Google has pushed out a security update resolving two zero-day bugs being actively exploited in the wild. Alongside Microsoft’s Patch Tuesday round, other vendors, too, have published security updates which can be accessed below. More

  • in

    Quantum cryptography: This air-filled fiber optic cable can transport un-hackable keys, say researchers

    Hollow core fiber has a hollow center filled with air, which runs the entire length of the cable and is encased in a ring of glass.   
    Image: BT / Lumenisity
    A new type of optical fiber filled with nothing but thin air has been found to be particularly effective to carry out quantum key distribution (QKD), a security protocol that is in principle un-hackable and could play a key role in protecting sensitive data against ever-more sophisticated cyber-attacks. BT experimented with QKD over a six-kilometer-long cable of hollow core fiber, a technology that it has been working on for the past few months as an alternative to traditional fiber optic cables.  Optical fiber is typically made of solid strands of glass that carry information by channeling light signals emitted by laser transmitters. Hollow core fiber, on the other hand, has a hollow center filled with air, which runs the entire length of the cable and is encased in a ring of glass. It turns out that this configuration is better suited to QKD, because it reduces the possibility that different signals interfere with each other and spoil the whole process. 

    Quantum Computing

    QKD works in a similar way to traditional cryptography: data is encoded into an unreadable message thanks to a cryptography key that the recipient needs to decrypt the information. The method works by encoding the cryptography key onto a quantum particle (or qubit) that is sent to the other person, who measures the qubit in order to obtain the key value. This approach is particularly interesting to security researchers because it is based on the laws of quantum physics, which dictate that qubits collapse as soon as they are measured. This means that if a third-party eavesdrops on the exchange and measures the qubits to figure out the cryptography key, they would inevitably leave behind a sign that they have intruded.  Cryptographers, therefore, call QKD “provably” secure. The method is expected to bring an additional level of safety to data exchanges, especially as hackers develop better tools to crack existing security protocols. 

    The technology is nascent, and researchers are looking at various ways to carry out QKD; but one of the most established approaches consists of using optic-fiber cables to send both the qubits that are loaded with the cryptography key, and the actual encrypted message. But when using traditional optical fiber, which is made of glass, the effectiveness of the protocol is limited. This is because the light signals that carry information are likely to spread their wavelengths when travelling through glass, an effect called “crosstalk” that causes channels of light to leak into other channels. For this reason, the encrypted message cannot be sent through the same cable as the qubits, which are exceptionally fragile and susceptible to the noise caused by crosstalk. The whole process, says BT, is comparable to trying to have a whispered conversation next to an orchestra. This is where hollow core fiber could make a big difference. In an air-filled channel, light signals don’t scatter as much, and less crosstalk occurs between channels. In other words, there can be a clear separation between the encrypted data stream and the faint quantum signal that carries the encryption key – even if they are both travelling over the same fiber. Ultimately, therefore, hollow core fiber could be a more efficient candidate for QKD – an “all-in-one” solution that requires less infrastructure to be built. “We know now that if we were to put hollow core fiber in, it could enable us to put quantum channels potentially anywhere we like, without having to worry,” Catherine White, a researcher at BT, tells ZDNet. “Whereas with standard fiber, we either have to assign separate fibers for the QKD system or we have to be really careful not to have too much classical power when doing the planning.” What’s more, in previous trials of the technology, BT has also demonstrated that sending light signals through an air-filled core is much faster than through glass: according to the company, hollow core fiber enables data to travel up to 50% faster than in traditional optical cables.  This means that the technology could also significantly reduce latency in the transmission of data. “This trial shows us the material we can work with, and it has wonderful properties like low latency and low scattering,” says White. BT’s trial remains limited: the experiment didn’t go so far as exchanging actual encrypted data, and instead looked at the behavior of the quantum particle when it was sent alongside a high-power classical channel, in this case a light signal. The success of the trial, says White, lies in the fact that both channels remained healthy, which wouldn’t be the case with standard fiber.  “We were just proving key exchange, not testing encryption in this case,” says White. But parameters from the trial, such as quantum bit error rate, indicate that the system effectively generated a key that could be used to protect data, continued the researcher. Experiments are now underway to apply the configuration to the exchange of data.The next challenge will be to find out whether the technology can be scaled up. BT trialed QKD on a six-kilometer-long cable – still far off other experiments with the protocol in which researchers have managed to deliver quantum particles over hundreds of kilometers.  Earlier this year, for example, researchers from Toshiba Europe’s Cambridge Research Laboratory demonstrated QKD on optical fibers exceeding 600 kilometers in length. White explains that, for all its low-latency and low-scattering properties, the hollow core fiber used in BT’s trial is not low-loss, which is a crucial property to extend the reach of QKD. Researchers, however, are working on fine-tuning the material to improve its performance in that respect. “Findings show that, when tuning the fiber for particular wavelengths, we are able to have astoundingly low loss,” says White. “This is very promising and we will see further developments.” “It does mean that hollow core fiber could potentially help reach longer reaches of QKD than we’ve seen,” she added. 

    Innovation More

  • in

    The state of ransomware: national emergencies and million-dollar blackmail

    Banks have been “disproportionately affected” by a surge in ransomware attacks, clocking a 1,318% increase year-on-year in 2021.

    Ransomware has become one of the most well-known and prevalent threats against the enterprise today. This year alone, we have seen high-profile cases of ransomware infection — including against Colonial Pipeline, Kaseya, and Ireland’s health service — cause everything from business disruption to fuel shortages, declarations of national emergency, and restricted medical care.  These attacks are performed for what can end up being multi-million dollar payouts and now these campaigns are becoming easier to perform with initial access offerings becoming readily available to purchase online, cutting out the time-consuming legwork necessary to launch ransomware on a corporate network.  There are a number of trends in the ransomware space of note, including: Payouts: After DarkSide forced Colonial Pipeline to take fuel pipes out of operation, prompting panic-buying across the US, the firm paid a $4.4 million ransom. CEO Joseph Blount said it was the “right thing to do for the country.” The largest ransom payment stands at over $30 million. High revenue: After analyzing online criminal activity, KELA says that organizations with annual revenue of over $100 million are considered the most attractive. Initial Access Brokers (IABs): IABs have become an established criminal business, often sought-after by ransomware groups looking for their next target.Preferred methods of access include RDP and VPN credentials or vulnerabilities. English speakers are also in high demand to take over the negotiation aspects of a successful attack.Leak sites: Ransomware groups will now often threaten to leak sensitive data stolen during an attack if a victim does not pay. Cisco Secure calls this a “one-two-punch” extortion method. Cartels: Researchers have found that ‘cartels’ are also forming, in which ransomware operators share information and tactics.In a cybersecurity threat roundup report published on Tuesday, researchers from Trend Micro said that during the first half of this year, ransomware remained a “standout threat” with large companies particularly at risk — due to their revenue and the prospect of big payouts — in what is known as “big-game hunting.” During the first six months of 2021, 7.3 million ransomware-related events were detected, the majority of which were WannaCry and Locky variants.  However, this is approximately half the number of detections during the same period in 2020, a decline the researchers have attributed to a shift away from low-value attempts to big-game hunts. 

    “An incident with the DarkSide ransomware [Colonial Pipeline attack] brought heightened attention to ransomware operators, which might have prompted some of them to lie low,” the researchers say. “Meanwhile, law enforcement agencies across the world conducted a series of ransomware operations takedowns that might have left an impact on wide-reaching active groups.” Banking, government entities, and manufacturing remain top targets for ransomware operators today.
    Trend Micro
    Open source and legitimate penetration testing or cybersecurity tools are also being widely abused by these threat actors. Cobalt Strike, PsExec, Mimikatz, and Process Hacker are noted in the report as present in the arsenals of Ransomware-as-a-Service (RaaS) groups including Clop, Conti, Maze, and Sodinokibi. In addition to ransomware, Business email compromise (BEC) rates have also increased slightly, by 4%, and cryptocurrency miners are now one of the most common strains of malware detected in the wild.  Trend Micro has also explored how misinformation relating to the COVID-19 pandemic is being used to spread malware. Phishing, social media, and social engineering are commonly employed to lure users into clicking on malicious attachments or visiting fraudulent domains, and coronavirus-related themes generally relate now not to the disease itself, but to testing and vaccination projects.  Malicious apps are part of the spread, some of which are spreading banking Remote Access Trojans (RATs) including Cerberus and Anubis.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Bot attacks grow 41% in first half of 2021: LexisNexis

    A new cybercrime report from LexisNexis Risk Solutions has found that bot attacks are up significantly in 2021, growing by 41% in the first half of the year.The biannual report found that the financial services industry and media businesses are facing the brunt of bot attacks while human-initiated attacks fell by 29%. According to the report, financial services companies saw 683 million bot attacks from January to June, while media companies dealt with 351 million, up 174% year over year. The LexisNexis Risk Solutions Cybercrime report is compiled by analysing 28.7 billion transactions over the six-month period through LexisNexis’ Digital Identity Network. Digital transactions overall are up nearly 30% this year.LexisNexis Risk Solutions researchers wrote that the United States still leads the way as the largest originator of automated bot attacks by volume, followed by the UK, Japan, Canada, Spain, Brazil, Ireland, India, Mexico and Germany. Stephen Topliss, vice president of fraud and identity for LexisNexis Risk Solutions, said the report confirms that cybercriminals are increasingly relying on automated processes but also highlights that fraudsters are further establishing sophisticated and expansive networks to conduct fraud.”Explosive transaction and user growth rates in industry sectors such as virtual banks and buy now pay later are likely exposing emergent risks for these newer businesses as they grab the attention of fraudsters,” Topliss said. “The digital businesses that survive and thrive will be those that deploy layered cybercrime prevention solutions as they scale.”Bot attacks increased worldwide, with every region recording growth in bot volume in the first half of 2021. The Asia Pacific region saw the most growth alongside South America. 

    Cybercriminals are industrializing fraud by “leveraging mass data breaches, sophisticated automated tools, and deep dark-web intelligence,” according to the report, which explained that due to limited in-person banking options at the beginning of the COVID-19 pandemic, many people turned to digital financial products and never looked back. Financial services companies are increasingly attacked through payment transactions, which “continue to be attacked at a higher rate than any other industry.” Media companies also face a significant number of new account creation attacks, with criminals using media organizations as a way to test stolen identity data. The report notes that there has also been an increase in attacks on cryptocurrency wallets. The researchers added that the future looks uncertain as economies around the globe look to rebuild after the COVID-19 pandemic.”Where fraud had been so heavily targeted on COVID-related stimulus packages and related scams, how will this approach evolve as support is wound up and economies start to rebuild? Will fraudsters start to capitalize on the fruits of their bot labors and use validated credentials in higher-volume human-initiated attacks?” the researchers wrote. “Will scams, targeting vulnerable and new-to-digital customers, continue to proliferate? How vulnerable will new payment methods and digital platforms — such as buy-now-pay-later — become in the face of economic uncertainty?” More

  • in

    HP patches severe OMEN driver privilege escalation vulnerability

    A high-impact vulnerability in OMEN Command Center driver software has been patched by HP.

    On Tuesday, researchers from SentinelLabs published a technical deep-dive on the bug, tracked as CVE-2021-3437 and issued with a CVSS score of 7.8.  SentinelLabs says the high-severity flaw impacts “millions of devices worldwide,” including a wide variety of OMEN gaming laptops and desktops, as well as HP Pavilion and HP ENVY models.Found by SentinelLabs researcher Kasif Dekel, CVE-2021-3437 is a privilege escalation vulnerability in the HP OMEN Command Center. The gaming hub can be used to adjust settings to a gamer’s preference — including fan speeds and overclocking — as well as to monitor a PC and network’s overall performance. A driver developed by HP and used by the software, HpPortIox64.sys, is the source of the security issue. According to the researchers, code partially comes from WinRing0.sys, an OpenLibSys driver used to manage actions including read/write kernel memory.  “The link between the two drivers can readily be seen as on some signed HP versions the metadata information shows the original filename and product name,” SentinelLabs noted.Privilege escalation bugs have been found in the WinRing0.sys driver in the past, including flaws that allow users to exploit the IOCTLs interface to perform high-level actions.

    Several lines of code in the driver’s IOCTL system call function “allow user mode applications with low privileges to read/write 1/2/4 bytes to or from an IO port,” the team says, which could potentially be exploited to allow unprivileged users to conduct system-level actions. “This high severity flaw, if exploited, could allow any user on the computer, even without privileges, to escalate privileges and run code in kernel mode,” the researchers say. “Among the obvious abuses of such vulnerabilities are that they could be used to bypass security products. An attacker with access to an organization’s network may also gain access to execute code on unpatched systems and use these vulnerabilities to gain local elevation of privileges. Attackers can then leverage other techniques to pivot to the broader network, like lateral movement.”HP OMEN Gaming Hub prior to version 11.6.3.0 and the HP OMEN Gaming Hub SDK Package, prior to 1.0.44, are impacted. At the time of writing, there is no evidence that the bug has been exploited in the wild.  SentinelLabs reported its findings on February 17, 2021. By May 14, HP sent a proposed fix to the researchers, but it was found that the patch was not sufficient. The tech giant’s security team then changed its tactic and disabled the vulnerable feature to resolve the security flaw, delivered on June 7. A patched version of the software was made available on July 27 in the Microsoft Store.”We would like to thank HP for their approach to our disclosure and for remediating the vulnerabilities quickly,” the researchers commented. “We urge users of these products to ensure they take appropriate mitigating measures without delay.”HP has published a security advisory on CVE-2021-3437, describing the flaw as a privilege escalation and denial-of-service issue.”We constantly monitor the security landscape and value work that helps us identify new potential threats,” HP told ZDNet. “We have posted a security bulletin. The security of our customers is always a top priority and we urge all customers to keep their systems up to date.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Parking garages converted for air taxi takeoff

    Archer
    Urban air mobility developers tend to wince at the term “flying car,” but it’s going to be a tough moniker to escape in the next few years. That’s because air taxis (slightly more palatable for the air mobility set) are taking off in a real way.That point is underlined in an ambitious new agreement between Archer, a leading urban air mobility company based in California, and the operator of thousands of parking garages in an expansive network that covers more than 70% of the U.S. Archer and REEF will work together to retrofit the top floor of parking garages in dense urban areas in order to accommodate Archer’s all-electric vertical takeoff and landing (VTOL) vehicle.”Archer is focused on developing urban aerial ridesharing networks that will ease the issues caused by excessive city congestion,” said Adam Goldstein, co-Founder and co-CEO of Archer. “We believe that working with REEF will allow us to accelerate our mission to transition congested urban areas to more sustainable forms of transportation. The ability to build out our early vertiports with light retrofitting of existing structures would allow us to scale operations while maintaining our focus on affordability for our customers. We’re thrilled to announce this strategic relationship as we continue to execute on our roadmap towards bringing urban air mobility to reality.”This is a smart partnership for Archer, which recognizes the value of a good logistics network. To draw a relevant comparison, much of Tesla’s brand loyalty stems from its massive network of charging stations, which are known among electric car drivers to be faster and online more of the time than many third-party providers. In order to convert transportation users to a new paradigm, convenience and multi-point support are paramount, something Tesla has taken seriously. Archer, by utilizing an existing transportation logistics network, is positioning itself to be a big player in areas like Los Angeles and Miami, two of its early markets.REEF, for its part, is also thinking outside the box. Its sites have been largely underutilized of late, a combination of pandemic-related behavior shifts and the rise of ride sharing and growing investment in public transport in many cities, including Los Angeles. By converting some of its existing inventory for VTOL, which sounds like a fairly straightforward process, it could be opening up a new revenue stream while easing its utilization woes in years to come.”One of REEF’s core areas of focus is to reduce traffic congestion and carbon emissions by supporting incredible transportation technologies like those Archer is building,” said George Fallica, REEF’s Chief Revenue Officer. “Archer’s focus on sustainability and transforming the everyday urban travel experience aligns closely with our own mission. We’re excited to be working with them on plans to reshape city landscapes and make existing infrastructure even more functional.”Of course, Archer, which has been developing high-value partnerships with major brands like United Airlines, isn’t taking chances on where it will place the takeoff and landing pads, which it calls vertiports. The company has developed a proprietary data science technology, which it calls Prime Radiant, to source optimal locations for VTOL pads to relieve congestion in high-traffic areas.  More

  • in

    Close to half of on-prem databases contain vulnerabilities, with many critical flaws

    A five-year study has concluded with a sobering fact for businesses using on-premise servers: close to half contain vulnerabilities that may be ripe for exploitation. 

    Imperva released the results of the study on Tuesday, which analyzed roughly 27,000 databases and their security posture. In total, 46% of on-premises databases worldwide, accounted for in the scan, contained known vulnerabilities.  On average, each database contained 26 security flaws, with 56% ranked as a “high” or “critical” severity bug — including code execution vulnerabilities that can be used to hijack an entire database and the information contained within.  All it may take, in some cases, is a scan on Shodan to find a target and executing a malicious payload.  “This indicates that many organizations are not prioritizing the security of their data and neglecting routine patching exercises,” Imperva says. “Based on Imperva scans, some CVEs have gone unaddressed for three or more years.” France was the worst offender for unprotected databases, with 84% of those scanned containing at least one vulnerability — and the average number of bugs per database was 72.  Australia followed with 65% (20 vulnerabilities on average), and then Singapore (64%, 62 security flaws per database), the United Kingdom (61%, 37 bugs on average), and China (52%, 74 security issues per database). In total, 37% of databases in the United States contained at least one known vulnerability, and these databases contained an average of 25 bugs. 

    The Microsoft Exchange Server hack has highlighted the ramifications of poor security for on-prem servers as well as their owners. In March, Microsoft released emergency patches to resolve four zero-days — known collectively as ProxyLogon – but once exploit code was developed and released, thousands of businesses were compromised.  In other recent database security news, a critical vulnerability impacting Cosmos DB became public in August. The bug, described as “trivial” to exploit by cloud security firm WIZ, gives “any Azure user full admin access (read, write, delete) to another customer’s Cosmos DB instances without authorization.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Juniper rolls out campus fabric management service to handle more devices

    Juniper Networks on Tuesday announced updates to its enterprise portfolio that will make it easier for organizations to deploy, operate and troubleshoot campus networks. The enhancements include a new campus fabric management capability that should help enterprises handle the growing number of mobile and IoT devices on their networks. Juniper is also expanding the capabilities of the the Marvis Virtual Network Assistant, to offer more proactive problem remediation.Both updates are ultimately about improving the user experience, said Christian Gilby, Juniper’s Senior Director of Product Marketing for the AI-driven enterprise. “It’s about the user device experience, but it’s also about IT experience,” he told ZDNet. “I think that’s been one of the things that the industry has really not paid enough attention to in the past — how do we make it easier for an IT team to manage and operate the network, especially if you look at what’s been going on devices-wise. You’ve got more and more devices coming into the network, and you’ve got to start to automate and leverage AI, so that you can deal with all of those devices.”Juniper is giving customers AI-driven campus fabric management capabilities via Juniper Mist Wired Assurance, the platform used to manage wired access in the campus. With EVPN-VXLAN campus fabric management, customers will be able to segment traffic in critical ways. A health care customer, for example, may have to segment its network to handle a growing number of device types, from patient smartphones connecting to Netflix to heart monitors and infusion pumps. Traditionally, campus networks have used VLANs for fabric management, but that solution doesn’t offer the ability to scale or segregate traffic as today’s device landscape requires. “For example, you don’t want an HVAC system on the same network as point of sale, because historically a lot of those security breaches have happened there,” Gilby said. “So it’s all about how do we secure the network and do it with simplicity.”

    The Juniper Mist Cloud gives administrators a simple UI from which they can choose a topology, define networks of interest, identify required physical connections and apply the correct underlying policies.Meanwhile, Juniper is also expanding the Marvis Virtual Network Assistant (VNA) for AI-driven, proactive troubleshooting. Marvis Actions takes insight derived from the Mist AI engine, such as the root cause of a problem, and recommends solutions for IT managers. Juniper is adding new actions, including persistently failing wired/wireless clients, bad cables, access point (AP) coverage holes, bad WAN links and insufficient RF capacity, among others.   One of Juniper’s customers, a large retailer, used the service to analyze its more than 150,000 store access points. It found coverage holes in seven of its stores. “It’s for needle in the haystack kinds of problems, and this is what AI is really well suited to do,” Gilby said.

    Networking More