Archive for June 17, 2023

US Department Of Energy Part of Global Cyberattack Involving The MOVEit Vulnerability

Posted in Commentary with tags on June 17, 2023 by itnerd

If you thought I was done with news on the the MOVEit vulnerablity, here’s another one.

Several US federal government agencies have been affected by the global cyberattack involving the MOVEit vulnerability and officials expect several hundred companies will also become impacted. In a statement to CNN, Eric Goldstein, CISA’s executive assistant director for cybersecurity, said that CISA “is providing support to several federal agencies that have experienced intrusions affecting their MOVEit applications.”

There were two Department of Energy victims: 1) Oak Ridge Associated Universities, a not-for-profit research center, and 2) Waste Isolation Pilot Plant – a contractor which disposes atomic energy waste.

CISA’s response comes as Progress Software said it had discovered a second bug in the code that the company was working to fix.

“We have communicated with customers on the steps they need to take to further secure their environments and we have also taken MOVEit Cloud offline as we urgently work to patch the issue,” Progress Software said in a statement.

The ransomware group had given victims until 6/14 to contact them about paying a ransom, after which they began listing victims on their extortion site. As of 6/15, the dark website did not list any US federal agencies, but instead the hackers wrote in all caps:

“If you are a government, city or police service do not worry, we erased all your data. You do not need to contact us. We have no interest to expose such information.” 

Willy Leichter, PV of Marketing, Cyware leads off with this comment: 

   “This is another frightening example of the risks of attack through supply chains. Our best defenses can be bypassed if we’re relying on vulnerable software for critical tasks, such as transferring large data files. We must find ways to extend our security intelligence and best practices to suppliers to close this gaping hole.”

Roy Akerman, Co-Founder & CEO, Rezonate follows up with this:

   “The MOVEit vulnerability was fast to turn from discovery to active exploitation in the field. Available proof of concepts of RCE exploitation increased the risk and organizations are called to take immediate action, in particular federal government agencies. Ransomware groups are known to adopt the latest infiltration techniques before patching is completed, especially when there are multiple patches that are rolling out as further details become available. We are closely monitoring for any further developments related to this SQL injection vulnerability that is actively exploited.”

That’s the last MOVEit story for today. But I am pretty sure there will be more in the days to come.

Review: Spigen Rugged Armour Card Holder For MagSafe

Posted in Products with tags on June 17, 2023 by itnerd

When I go out for a training ride on my new road bike, I try to carry as little as possible. Specifically, my house keys, my iPhone 14 Pro, and a couple of pieces of ID. Up until this point I was using this Ekster MagSafe wallet to carry my ID. But the problem is that it is leather, and leather and sweat are not a good combination. So I wanted another option that was more compatible with doing an activity that involved sweat. Thus after some hunting around, I found this:

This is the Spigen Rugged Armour Card Holder For MagSafe. It holds two cards and is made of a silicone like material.

You can get a better look at that material here with a pair of cards inserted into the card holder. The fact that it is made of silicone means that sweat will not be an issue. The company says that it holds two cards, and they are right as I attempted to sneak my VISA card into the card holder on top of two other cards and it wouldn’t fit. But that’s still fine as I only need to take my drivers license and health card with me when I ride. I’ll also mention that if you have other Spigen gear, the faux carbon fibre motif fits in with their cases and the like. That way you can be all “matchy matchy” as my wife would say.

On the back you’ll note that there are two pads on the bottom. They are made of some sort of material that is tacky. And that is what makes this card holder work. When put directly onto an iPhone or onto a MagSafe case like this one, it stays solidly on the back of the iPhone or case. That’s another win for me as I have always been concerned about a card holder like this coming off my phone and being lost someplace on a bike ride. In my opinion, that’s less likely to happen with this card holder.

The Spigen Rugged Armour Card Holder For MagSafe goes for $39 USD and I would really take a good look at it if you want a card holder that is guaranteed to stay on your phone no matter what, and is made of a material that is more durable than leather.

The Oregon DoT Has Become The Latest Victim Of The MOVEit Vulnerability

Posted in Commentary with tags on June 17, 2023 by itnerd

Yesterday, the Oregon Department of Transportation said the drivers’ licenses and IDs of 3.5 million Oregonians are at risk after a data breach involving the now infamous MOVEit vulnerability  that has been responsible for pwnage left and right. 

State officials became aware on June 1 that the agency’s system had been hacked and within a few hours the systems were locked down. It took almost two weeks of analysis to determine that the hack compromised the state’s driver license and ID records. 

Currently, the DMV is not able to identify exactly whose IDs have been breached, but they say all Oregonians should assume their information has been compromised. Furthermore, it is unclear whether details beyond a license number, photo or address had been accessed. 

“For security purposes, we’re not going to discuss exactly what data points were potentially included in that file,” said Amy Joyce, ODOT DMV Administrator.  

Stephen Gates, Principal Security SME, Horizon3.ai had this to say:

   “News of this breach (and more like it) is a textbook example of attackers taking advantage of the window of opportunity predicament. Vulnerabilities in widely used software applications are publicly announced, and new patches are becoming available from the vendor, yet the patches have often not been applied – resulting in a breach.

   “The reason why attackers are successful at exploiting the window of opportunity is multi-fold. Often, organizations don’t always know what applications need to be patched, they give critical patching a lower priority than they should, they must wait for maintenance windows to patch vulnerable applications, and/or they often try to protect known vulnerabilities with other security controls not designed to mitigate the identified risk. Expect more of the same folks.”

I honestly don’t expect the announcements of organizations being pwned by the MOVEit vulnerability to slow down anytime soon. And it illustrates what happens when a threat actor gets their hands on a vulnerability in software or hardware that is widely used.