Archive for August 24, 2023

The CEO Of Zoom Says You Can’t Get Anything Done On Zoom…. WTF?

Posted in Commentary with tags on August 24, 2023 by itnerd

From the “what a hypocrite” department comes a leaked all hands meeting with Zoom CEO Eric Yuan said this:

“Quite often, you come up with great ideas, but when we are all on Zoom, it’s really hard,” Zoom CEO Eric Yuan told workers during an August 3rd meeting. “We cannot have a great conversation. We cannot debate each other well because everyone tends to be very friendly when you join a Zoom call.

“Besides the idea that innovation is better fostered in person, Yuan said office work is important because it builds trust among employees.

“Trust is a foundation for everything,” he said. “Without trust, we will be slow.”

So let me get this straight. Yuan claims that you work better in person versus on Zoom. Despite the fact that he’s the CEO of Zoom who made remote work a “thing” during the pandemic. That blows my mind and I have to wonder how anyone at Zoom can sell Zoom licenses with a straight face now that this is out there.

Now I have plenty of clients who are remote working and not only has the world not imploded, they’re thriving. So in short, he’s wrong and I have to wonder how many people at Zoom are currently looking for other jobs because of Yuan’s stance.

UPDATE: Allen Drennan, Co-Founder & Principal, Cordoniq had this comment:

“Instead of trying to use generic or legacy conferencing products, businesses should be investing in immersive solutions that integrate into their workflow and have the elements and touch-points that allow their distributed workforce to interact in a way that is the same as being in the office.”

Teamsters Accuse CN Rail Of Secretly Tracking Their Employees Movements Via Company Issued Tablets

Posted in Commentary with tags , on August 24, 2023 by itnerd

This is one of those topics that I always thought would come up more often. CTV News is reporting that the Teamsters union is accusing CN Rail of tracking employees movements, even after hours via the tablets that CN Rail issues their employees and not disclosing that they were doing so:

The Teamsters Canada Rail Conference, which is the union that represents 5,500 Canadian National railway employees, alleges CN has been monitoring the whereabouts of a train operator outside of work hours through a company-issued tablet.

“It’s spying, it’s wrong and it’s illegal in our view” according to Teamsters Canada’s director of public affairs Christopher Monette, who adds “on top of it being creepy, it’s downright dystopian. It’s something that shouldn’t be happening.” 

The union says they have reason to be concerned that a large number of CN Rail employees may have also had their location tracked by the company during their own personal time after work.Speaking to CTV National News, Monette says that CN “didn’t tell us this was going on and they didn’t seek consent from workers to use geolocation data” from their company issued devices and believes CN was trying to keep their tracking methods secret.

“We only found out about this by accident, through a disclosure process where the company was forced to disclose why they were disciplining a worker,” according to Monette.

Now CN Rail doesn’t want to comment on this. But frankly I am not surprised. Tablets and phones issued by companies are often what are called “managed” devices. Meaning that the devices are put into a type of software called Mobile Device Management software or MDM for short. This software allows a company to do a number of things. Get the status of the device, push out software updates, remote control the device for troubleshooting purposes, and most relevant to this story, track the device. Now a company may only decide to use this software to track a device if it is stolen. But I can see a scenario where a company may use this software to track a device at all times. Which if they disclose that up front, I guess that’s fine. But if they didn’t you get this situation.

Now if you have a company issued device and are afraid of being tracked, there are very low tech solutions to this:

Cyber security analyst and lawyer Ritesh Kotak believes employees who have a work phone, tablet or laptop should try and purchase their own personal devices to use off work hours.

“These high-tech problems have really low-tech solutions,” Kotak says.

He also says that he uses a tab to cover the camera on his work computer when he’s not on a video call. Kotak adds that, if possible, employees should turn their work devices onto airplane mode off work hours.

“It’s important to understand that information (from your devices) is being collected on a continuous basis by the employer, it’s probably being stored and there maybe third parties who have access to it.”

One thing to consider is that if you go this route, your company may complain at some point because the device isn’t on all the time. Another thing to consider is if you “BYOD” or bring your own device, and the company puts their MDM software on it, you could be in the same situation. So you may want to keep that in mind as well.

The bottom line is that if you use company property, or simply have their software installed on your own smartphone or computer, you should have no expectation of privacy. Ever. Unfortunate, but true.

Mujjo Labor Day sale! 40% off select iPhone 14 cases

Posted in Commentary with tags on August 24, 2023 by itnerd

Here’s a quick heads up from Mujjo who makes some of the best iPhone cases around. Some of their iPhone 14 cases are discounted through the Labour Day weekend

These are the styles that are part of the sale:
Full Leather Case for iPhone 14 
Full Leather Wallet Case for iPhone 14
Full Leather MagSafe Wallet Case for iPhone 14
Full Leather Case for iPhone 14 Plus
Full Leather Wallet Case for iPhone 14 Plus
Full Leather MagSafe Wallet Case for iPhone 14 Plus

You can find more information on their iPhone 14 cases here. 

Horizon3.ai Publishes POC for Ivanti Sentry Authentication Bypass

Posted in Commentary with tags on August 24, 2023 by itnerd

Ivanti yesterday updated the alert “KB API Authentication Bypass on Sentry Administrator Interface” – an advisory for CVE-2023-38035. The vulnerability has been added to CISA KEV and comes on the heels of an in-the-wild-exploited vulnerability in Ivanti EPMM (CVE-2023-35078). 

Horizon3.ai has just published a Proof of Concept (POC) and deep dive into how this new vulnerability can be used to give an attacker the ability to remotely execute code as the root user.

Horizon3.ai Exploit Developer James Horseman noted: “There aren’t any definitive IoCs that we have found so far. However, any unrecognized HTTP requests to /services/* should be cause for concern. The endpoint that we exploited is likely not the only one that would allow an attacker to take control of the machine. Ivanti Sentry doesn’t offer a standard Unix shell, but if a known exploited system is being forensically analyzed, /var/log/tomcat2/contains access logs that can be used to check which endpoints were accessed. Lastly, there are logs in the web interface that might be of use to check for any suspicious activity.”

Ivanti Sentry (formerly MobileIron Sentry) notes in its August 23rd advisory that “CVE-2023-38035 enables an unauthenticated actor with access to the System Manager Portal (default hosted on port 8443) to make configuration changes to Sentry and underlying operating system. Successful exploitation can ultimately allow a malicious actor to execute OS commands on the appliance as root.” Exploitation is only possible though the System Manager Portal, hosted on port 8443 by default.

You can read the deep dive here.

Microsoft Impersonated Most Out Of Nearly 350 Brands: Abnormal Security

Posted in Commentary with tags on August 24, 2023 by itnerd

Abnormal Security has published its latest Abnormal Intelligence, which has detected 350+ brand impersonation attacks over the past year, analyzing brand and credential phishing attack trends in the first half of 2023 with generative AI increasing the threat. 

Mike Britton, CISO at Abnormal Security, unveils the top 10 most popular brand impersonations in 2023, with Microsoft taking the lead as the top most phishing brand, followed by PayPal, Facebook, DocuSign, Intuit, DHL, McAfee, Google, Amazon, and Oracle. 

Brand impersonation is an increasingly threatened vector with the increase in reliance on generative AI tools. Abnormal recently stopped an attack that impersonates DHL, which looks legitimate, and asks the target to click the link to pay a delivery fee, which is required due to unpaid customs duties. Upon doing so, the recipient would have their credit card information stolen by the phishing site. 

You can read the details here.

Criminals wipe all CloudNordic servers and customer data

Posted in Commentary with tags on August 24, 2023 by itnerd

According to a CloudNordic notice to customers, criminals have encrypted all servers and customer data and the company says it can’t and will not pay the ransom demand. 

CloudNordic has advised its customers to prepare for the possibility of complete data loss due to a recent ransomware attack. The attack, which occurred on Friday August 18, severely impacted CloudNordic’s operations, leading to a shutdown of their servers and data loss for both the company and its clients. 

During the attack, malicious actors targeted CloudNordic’s systems, resulting in the deletion of company data and customer websites and email systems. Since then, CloudNordic’s IT team, along with third-party responders, has been working to recover customer data, but the chances of success are diminishing. 

In a statement, CloudNordic explained, “Unfortunately, it has proven difficult to recover most of the data, and many of our customers have likely lost their data with us unless they have been contacted individually.” 

CloudNordic suspects that the attack occurred during a server migration from one data center to another. Some servers were infected before the move, and during the transfer, servers from different networks were connected to CloudNordic’s internal network. This allowed the attackers to access administrative systems, storage, replication backup systems, and secondary backups, which were then encrypted for ransom. 

As of now, CloudNordic is working on restoring customer web and email servers, but data recovery remains a challenge, and DNS services are still unavailable.

Steve Hahn, Executive VP, BullWall had this comment:   

“Migrations are when companies are at their most vulnerable. Whether it’s the Dallas Police a few years back, who lost terabytes of data during a migration, throwing cases and convictions into to chaos, or latent cyber attacks that are triggered during the migration, companies need a containment, backup and security plan in place long before the migration occurs. During one of these large scale migrations we often see ports opened, applications white listed, security services may be suspended and people are generally more at risk to social engineering strategies,    

“The attack vectors multiply by the100’s during these migrations and our data is at its most vulnerable state. Often companies put security projects on hold to “focus” on these migrations, when precisely the opposite should occur. The migration should be put on hold until the security controls are firmly in place and tested.”  

Willy Leichter, PV of Marketing, Cyware follows with this:    

“While it is good to see Viking toughness in refusing to pay a ransom, it’s easier to take this stance when you have no other options. This is a tragic example of how vulnerable many smaller service providers can be, and customers need to always beware – don’t depend on one service provider with your valuable data – if they get wiped out, so does your data.”

Backup, Backup, Backup! It doesn’t matter if your data is local or in the cloud. You need a backup because if you get pwned locally or in the cloud, you will need that backup.

2.6 million Duolingo users email addresses exposed…Again

Posted in Commentary with tags on August 24, 2023 by itnerd

Yesterday, as spotted by VX-Underground, the scraped data of 2.6 million users of DuoLingo, one of the largest language learning sites in the world, was re-leaked on a hacking forum and offered for just $2.23.

This past January, Duolingo had the scraped data of the 2.6 million users on a now-shutdown hacking forum for $1,500. The data included login names and full names only, which DuoLingo confirmed was data from public profiles. DuoLingo claimed they were investigating whether further precautions should be taken, but they did not address the fact that email addresses, not publicly available, were also in the dataset. 

The latest data set was scraped using an exposed API that is currently open and has been since at least March 2023, and allows anyone to submit a username and retrieve the user’s public profile information. Meanwhile, one can also feed an email address into the API and confirm if it is associated with a valid DuoLingo account.

George McGregor, VP, Approov had this to say:   

“This unfortunately makes Duolingo look extremely negligent for a number of reasons     

“Lets list out some of the issues: 

  • The API returning public profile data based on a username without any other checks 
  • Automated scraping was possible because scripts can be run against the API: in other words  no backend check that requests are coming from a genuine app
  • The issue had actually been previously identified but not addressed

    “A good mobile security solution can be used to address these issues and restrict API access to properly validated app instances.” 

The fact that this has happened before to DuoLingo before is bad, and makes it an app to avoid. Too bad that you don’t know how good the security of other apps is before you use them. Thus all app makers have to step up on this front.

Cyberint and Cyware Announce Integration to Enhance Detection and Automated Response 

Posted in Commentary with tags , on August 24, 2023 by itnerd

Cyberint, the leader in impactful intelligence, is thrilled to announce its integration with Cyware, the leading provider of threat intelligence management, security collaboration, and cyber fusion solutions. The combined solution enables organizations to access and integrate contextual threat intelligence, enhance their threat-hunting capabilities, and automate collaborative response actions to potential attacks. The joint solution and use cases will be detailed in an upcoming webinar on August 29 at 1:00 pm EDT.

With this collaboration, Cyberint’s web intelligence seamlessly integrates with Cyware’s Threat Intel Exchange product enabling customers to:

  • Identify potential threats at an early stage by leveraging streamlined deep and dark web intelligence,
  • Receive contextual threat intelligence to enrich and enhance security tools, blocklists, threat research, and threat-hunting activities,
  • Aggregate threat intelligence from multiple sources to create clear visibility into threat patterns,
  • Automatically notify all stakeholders about critical intelligence,
  • Proactively build detection rules and automate response actions to reduce the risk of successful attacks.

Cyberint’s impactful intelligence solution fuses real-time threat intelligence with bespoke attack surface management, providing organizations with extensive integrated visibility into their external risk exposure. Leveraging autonomous discovery of all external-facing assets, coupled with open, deep & dark web intelligence, the solution allows cybersecurity teams to uncover their most relevant known and unknown digital risks – earlier. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to prevent, detect, investigate, and remediate phishing, fraud, ransomware, brand abuse, data leaks, external vulnerabilities and more, ensuring continuous external protection from cyber threats.

Cyware helps enterprises transform security operations while breaking through silos for threat intelligence sharing, collaboration, and automated threat response. Its unique Cyber Fusion solutions enable lean security teams to proactively stop threats, connect the dots on security incidents, dramatically reduce response time, and reduce analyst burnout from repetitive tasks. Cyware improves security outcomes for enterprises, government agencies, and MSSPs, and provides threat intelligence-sharing platforms for the majority of ISAC/ISAO information-sharing communities globally. 

H1 Healthcare report: Breaches down, victims up

Posted in Commentary with tags on August 24, 2023 by itnerd

Critical Insight has released its 2023 H1 Healthcare Data Breach Report, which despite an overall decrease of 15% in total breaches during the first half of 2023, there was a 31% increase in the number of individuals impacted by those breaches compared to the 2nd half of 2022.  

The decline in the number of breaches is a positive development and suggests a potential downturn in overall breaches for 2023, the lowest breach count since 2019. Unfortunately, the positivity is counterbalanced by the 40 million individuals impacted within six months, which is 74% of the total affected in 2022.  

  • 73% of the primary causes of the breaches were centered around hacking and IT incidents while unauthorized access and disclosure followed as the second most prominent
  • 97% of the compromised individual records were a result of exploited network server vulnerabilities

Also noteworthy is the increased targeting of the industries third-parties (48%) which surpassed those directly impacting the healthcare providers and health plans (43%). Also, of individuals affected, 50% were connected to a third party.

George McGregor, VP, Approov had this to say:   

“The percentage increase in breaches of healthcare business associates rather than core healthcare providers is in fact a worrying trend.  This may be related to increased adoption of open APIs (e.g. FHIR) to healthcare data. The security of the mobile apps and separate entities accessing healthcare APIs  has been previously flagged in a number of reports as a potential entry point for hackers.”

Healthcare is one of those prime targets for threat actors. Thus those in that sector need to do everything possible to make sure that they do not continue to be a prime target.