Author Archive

Targus Announces Industry-First Five-Year Warranty with Price Cuts on Select Premium Docking Station Models

Posted in Commentary with tags on July 2, 2024 by itnerd

 Targus today announced that it now offers an industry-first five year warranty with new reduced pricing on its best-in-class universal docking stations – specifically DOCK310DOCK315, and DOCK430 – purchased after July 1, 2024. The extended five-year warranty on these select models further demonstrates the company’s long track record of delivering superior quality tech solutions that boost workers’ productivity, performance, and connectivity, anywhere. 

This new extended warranty is now being offered with unbeatable pricing on three of its latest universal docking stations compatible with Windows, macOS, Android, Chrome OS, and other major operating systems, to ensure business customers are covered with the best warranty in the industry that will meet or exceed the expected three- to five-year lifecycle of their PCs.

The Universal USB-C DV4K Docking Station with 65W Power Delivery (DOCK310) is a sleek and powerful dock packed with all the necessary ports and power needed in a single dock to create a convenient, productive workstation. This universal docking station connects two 4K displays to multiple hosts and peripherals for a dual ultra-high-definition video experience with power delivery 3.0 up to 65WDC. Three USB 3.2 Gen 1 Type-A ports and 1 USB 3.2 Gen 1 Type-C port make it simple to add the latest keyboards, exterior hard drives, and other peripherals to customize the workspace experience.

The Universal USB-C DV4K DP Docking Station with 65W Power Delivery (DOCK315) is the ultimate universal docking station to expand a workstation and connect to nearly any laptop with a single cable. This dual monitor docking station delivers crisp and clear 4K video outputs while supporting a connection up to two displays via DisplayPort ™ to multiple hosts and peripherals for a dual ultra-high-definition video experience. This powerful dock supports single 5K and dual 4K UHD HDR at 65WDC, offering video performance up to 4096×2160 p60 for dual displays. Users can also connect their favorite accessories with a combination of USB-A (3x USB 3.2 Gen 1 Type-A ports) and USB-C (1x USB 3.2 Gen 2 Type-C), plus Ethernet and audio ports.

The USB-C Multi-Function 202DisplayPort Alt. Mode Triple Video Docking Station with 85W Power (DOCK430) is a sleek and powerful Alternate Mode dock which packs all of the ports and power needed in a single dock to create a more powerful, productive workstation. Enjoy crisp, clear native video while supporting a connection up to three monitors. With two DisplayPort™ 1.4 ports and one HDMI 2.0 port, this dock supports three monitors (1920×1080 p60), two monitors (2560×1440 p60) or one monitor (3840×2160 p60) and various lower resolutions. Plus, users can connect to all of their favorite accessories with a combination of USB-A (4 USB 3.2 Gen1 ports, 1 fast-charging) and USB-C (1x 3.2 Gen2), plus Ethernet and audio ports.

All three of these Targus universal docking stations, which come with the new extended five-year warranty, are available for sale at Targus.com and through participating resellers and distributors worldwide. Visit Targus.com for additional product details, pricing, and availability.

The IMS Hack Is MUCH Worse Than Previously Thought

Posted in Commentary with tags on July 2, 2024 by itnerd

Infosys McCamish Systems (IMS) has started sending out data breach notification letters regarding a ransomware attack that it disclosed in February 2024 to over 6 million victims, far more than the initially reported 57,000 Bank of America customers. I covered that initial report here.

IMS is a multinational corporation that provides business consulting, IT, and outsourcing services in the insurance and financial services industries for companies such as the Bank of America and seven out of the top ten insurers in the country.

In February 2024, IMS informed the public that it had been hit by ransomware in November 2023 resulting in the compromise of the personal data of about 57,000 Bank of America customers.

In a new notification shared with the authorities, IMS now says the total number of people affected is over 6 million.

The compromised data varies by individual but includes the following:

  • Social Security Number 
  • Date of birth
  • Medical treatment/record information
  • Biometric data
  • Email address and password
  • Username and password
  • Driver’s License number or state ID number
  • Financial account information
  • Payment card information
  • Passport number
  • Tribal ID number
  • U.S. military ID number

IMS has not disclosed which of its clients were impacted except for Oceanview Life and Annuity Company. The list of impacted data owners may be supplemented as more customers request to be named in the filing.

Evan Dornbush, former NSA cybersecurity expert, has this comment:

“This is another example of attacks becoming more complex and taking longer to determine full impact.

 “Also once again, this is an example of customers becoming passive victims in a process where they cannot take any action beyond hoping the breach isn’t so bad.  It’s simply maddening.  While some of the compromised data can be easily replaced – such as credit card numbers, license and passport identifiers are less easily renewed, and the loss of medical treatment and biometric data is irrevocably damaging to one’s privacy.”

Given the scope of this breach, I am hoping that IMS, Bank of America, and whomever else was involved in this is hauled before the relevant authorities and made to answer questions on this. Because a breach this size that took months to figure out is simply unacceptable.

A New OpenSSH Vulnerability Is Going To Be A Big Deal As It Affects A Whole Lot Of Things

Posted in Commentary with tags on July 2, 2024 by itnerd

It is being reported that a new OpenSSH vulnerability which is currently being tracked as CVE-2024-6387 could impact 14 million internet-facing OpenSSH instances:

The Qualys Threat Research Unit (TRU) discovered this unauthenticated Remote Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. This bug marks the first OpenSSH vulnerability in nearly two decades—an unauthenticated RCE that grants full root access. It affects the default configuration and does not require user interaction, posing a significant exploit risk. 

In Qualys TRU’s analysis, we identified that this vulnerability is a regression of the previously patched vulnerability CVE-2006-5051, reported in 2006. A regression in this context means that a flaw, once fixed, has reappeared in a subsequent software release, typically due to changes or updates that inadvertently reintroduce the issue. This incident highlights the crucial role of thorough regression testing to prevent the reintroduction of known vulnerabilities into the environment. This regression was introduced in October 2020 (OpenSSH 8.5p1).

Rogier Fischer, CEO and Co-Founder at Hadrian Security noted the following:

“While there is currently no proof of concept demonstrating this vulnerability, and it has only been shown to be exploitable under controlled lab conditions, it is plausible that a public exploit for this vulnerability could emerge in the near future. Hence it’s strongly advised to patch this vulnerability before this becomes the case”.

This is correct. Now that this is out there, it’s time to patch all the things. Hadrian has a blog post that goes down the rabbit hole on this vulnerability including mitigation steps.

17 Million Americans to Adopt Antivirus Software in Next 6 Months: Security.org

Posted in Commentary with tags on July 1, 2024 by itnerd

Although some experts argue it is archaic, and tools like Kaspersky have recently increased security risks for users, 121 million Americans (46 percent) rely on antivirus technology.

Another 17 million plan to adopt in the next six months, leveraging both paid and free third-party antivirus software from providers like Norton and McAfee, among others.

Meanwhile, 54 percent rely on built-in antivirus protections (or none at all) on their devices, from the likes of Apple and Microsoft.

Security.org’s report also found:

  • Seventeen percent of adults run antivirus programs on their mobile phones
  • Americans aged 65 or older are twice as likely to pay for antivirus as those under 45
  • Norton Antivirus remains the top choice for paying customers, while McAfee is the most popular free program
  • About three percent of antivirus users were running Kaspersky software before the U.S. government banned sales last month
  • Antivirus use for cryptocurrency transactions has increased in the past two years, while the need to secure remote working connections has dropped by half

To read the new annual antivirus report by Security.org visit: https://www.security.org/antivirus/antivirus-consumer-report-annual/

Dump Your D-Link DIR-859 Router In The Trash Because Hackers Are Exploiting It To Pwn You

Posted in Commentary with tags on June 30, 2024 by itnerd

So let me start with the exploit behind the title in this story. D-Link has released a security advisory which is tied to CVE-2024-0769 that goes like this:

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

 So let’s unpack this. In English, what this is saying is that an attack that can be launched remotely exists that allows attackers to leak session data, achieve privilege escalation, and gain full control via the admin panel. In short, they can take over the router. And presumably use that access to launch secondary attacks. Like theft of data for example via reconfiguring the router to let them have full access to your network. On top of that you’ll note this part:

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

So this isn’t going to get fixed. Which means that if you have one of these routers, your best course of action is to throw it in the trash (or responsibly recycle it) and get something else. I say that because the word on the street is that threat actors are actively using this exploit to pwn people. Thus you don’t want to be the person on the other end of that.

TeamViewer Pwned Again

Posted in Commentary with tags on June 29, 2024 by itnerd

Today, TeamViewer, a large remote access and control software provider, has confirmed a data breach by the notorious hacker group Midnight Blizzard. The company’s statement confirmed the breach is tied to an employee’s credentials within its Corporate IT environment. Bleeping Computer has more details:

While TeamViewer states there is no evidence that its product environment or customer data has been breached, its massive use in both consumer and corporate environments makes any breach a significant concern as it would provide full access to internal networks.

In 2019, TeamViewer confirmed a 2016 breach linked to Chinese threat actors due to their use of the Winnti backdoor. The company said they did not disclose the breach at the time as data was not stolen in the attack.

Glenn Chisolm, Co-Founder, Obsidian had this to say:

“Identity compromise, which has been a driver in the TeamViewer incident, is a critical component of most breaches we see in customer environments, accounting for over 80% of SaaS breaches. We see TeamViewer deployed by 1-in-3 organizations – so ensuring that the breach is contained is the first big step for the company. 

Our advice to customers to minimize identity compromises is to follow 3 crucial steps – a) centralize identity access behind an IdP — often many apps also have local users, and ensuring the right levels of security is much harder in a distributed setting, b) federated access supported with the right levels of MFA to elevate the security, and c) monitor and protect employee accounts, especially administrative accounts, against abnormal behavior — such as can result from spear phishing attacks, AiTM phishing, and more.”

TeamViewer is something that I have been strongly recommending against since their 2016 hack that they only admitted to three years later. This reinforces the fact that if you use TeamViewer, you should strongly consider using another product. Because TeamViewer clearly cannot be trusted.

“Clusterbomb” Malware droppers hit over 50,000 victims 

Posted in Commentary with tags on June 28, 2024 by itnerd

Security researchers discovered a threat actor known as Unfurling Hemlock infecting target systems with up to ten pieces of malware simultaneously. Dubbed a “malware cluster bomb” by researchers, this method involves using one malware sample to spread additional ones on compromised machines. The malware mainly consisted of stealers, such as Redline, RisePro and Mystic Stealer, and loaders such as Amadey and SmokeLoader.

Outpost24’s KrakenLabs, the Cyber Threat Intelligence team, discovered this operation. Their findings reveal that Unfurling Hemlock’s activity dates back to at least February 2023 and employs a unique distribution method. KrakenLabs has identified over 50,000 “cluster bomb” files with distinct characteristics linking them to Unfurling Hemlock.

The attack begins with the execution of a file named ‘WEXTRACT.EXE’, which arrives on target devices through malicious emails or malware loaders that Unfurling Hemlock acquires from other operators. This executable contains nested compressed cabinet files, each level holding a malware sample and another compressed file. As each stage is unpacked, a new malware variant is dropped onto the victim’s machine. The final stage’s extracted files are executed in reverse order, with the most recently extracted malware executed first.

The researchers found that over half of Unfurling Hemlock’s attacks targeted systems in the United States, with significant activity also observed in Germany, Russia, Turkey, India, and Canada.

Evan Dornbush, former NSA cybersecurity expert had this to say:

   “KrakenLabs’ report demonstrates why it is critical to support cybersecurity research efforts. The attackers appear to have taken a multitude of known tools and packaged them up in a novel mechanism that could facilitate evasion from defensive technology or, if detected, only be partially caught and removed from infected systems. In other words, things the defensive community thought were “solved” are still able to have harmful impact. This report highlights how both attackers and defenders incrementally improve looking at prior works.”

Organizations and perhaps individuals have one more thing that they can add to the list of things that they need to create defences to stop. Making life hard for overworked teams who are responsible for stopping cyber threats.

The BlackSuit ransomware gang claims Responsibility For Kadokawa ransomware attack

Posted in Commentary with tags on June 28, 2024 by itnerd

The BlackSuit ransomware gang is claiming responsibility for a June 8th cyberattack on Kadokawa Corporation, threatening to publish stolen data unless a ransom is paid. The gang has set a deadline of July 1st for the ransom, warning that the released data will include contacts, confidential documents, employee data, business plans, and financial data.

Kadokawa Corporation is a major Japanese media conglomerate involved in film, publishing, and gaming, including the well-known game developer FromSoftware. The company reported net sales of approximately $1.6 Billion USD in 2023. The cyberattack caused service outages across multiple Kadokawa Group websites, significantly disrupting the company’s operations as they share the same data center. This attack particularly affected the popular Japanese video-sharing platform Niconico.

“In response to the system failure, Kadokawa is working on building a secure network and server environment,” explained the Wednesday update.

“Its top priority is to restore the accounting functions, which are fundamental to its business activities, and to normalize the manufacturing and distribution functions in the publication business, which generate considerable revenue. The accounting functions, owing partly to measures in an analog manner, are expected to be restored in early July.”

BullWall Executive, Carol Volk had this comment:

“As Kadokawa rebuilds its systems, focusing on the protective aspects of ransomware containment is crucial. A robust ransomware containment system offers significant benefits over simple Endpoint Detection and Response (EDR) solutions. While EDR is essential for identifying and mitigating threats, a comprehensive ransomware containment system ensures that sensitive data remains secure even during an attack. This approach not only detects but also isolates and neutralizes threats”

Cigent CGO Brett Hansen follows with this comment:

“Restoring critical functions and rebuilding the network is table stakes after a major attack and fortifying against similar threats. That said, it is more a matter of protection, than detection to ensure data remains safe during an attack. When data is protected at rest, it can remain safe during an attack. There are multiple ways to ensure an attacker in-system still cannot steal or encrypt your data. zero-trust, MFA, hidden partitions and encryption are all proven methods of protecting data at rest when properly implemented.”

I wish the company luck in restoring their systems. But in this day and age, you need a plan to keep the bad guys out, and a plan to fix everything if they do get in. I am not sure about the first part of this, but this organization is certainly testing the second part right now.

Texas Retina Associates Gets Pwned…. Lots Of Personally Identifiable Information Has Been Leaked

Posted in Commentary with tags on June 28, 2024 by itnerd

Ophthalmology practice Texas Retina Associates yesterday notified nearly 300,000 customers about a data breach earlier in the year that compromised names, Social Security numbers, medical info, health insurance info, addresses, and dates of birth:

On June 26, 2024, Texas Retina Associates (“Texas Retina”) filed a notice of data breach with the Attorney General of Texas after discovering that confidential information that had been entrusted to the company was subject to unauthorized access. In this notice, Texas Retina explains that the incident resulted in an unauthorized party being able to access consumers’ sensitive information, which includes their names, Social Security numbers, addresses, medical information, health insurance information and dates of birth. Upon completing its investigation, Texas Retina began sending out data breach notification letters to all individuals whose information was affected by the recent data security incident.

Rogier Fischer, CEO and Co-Founder, Hadrian had this to say:

“We don’t have the specific details on the cause of breach or the impact of it, but based on the cases that we handled in the US, we see several issues firms in the US, particularly Texas, could face in such a situation. If a data breach occurs at a Texas-based firm, the Texas Business and Commerce Code mandates that the firm must notify affected individuals immediately. If over 250 residents are affected, the Texas Attorney General must also be informed. HIPAA rules come into play if any medical information was compromised, as in this case. The HIPPA provisions demand specific notifications and call for potential penalties on non-compliance.

The business or organization in question may face scrutiny from the FTC if their data security measures are deemed inadequate. Possible penalties in that case include fines, civil damages, and orders to improve our security protocols. Apart from the regulatory compliance issues, the organization could face potential class action lawsuits from affected individuals, citing negligence or breach of privacy. In this particular case, the Texas Attorney General could also pursue legal action, leading to civil penalties and mandated corrective actions.There are several steps to mitigate the damage in these situations, but adopting an offensive cybersecurity strategy is the best defense of all. Automated penetration testing keeps the organization a step ahead of their peers, while automated compliance and reporting ensures that the systems they have in place are up and updated all the time.”

I think it’s a pretty safe bet that Texas Retina Associates are about to come under a lot of scrutiny over this….. Whatever this is as details are pretty scarce. I hope they have answers for all the questions that they’ve about to be asked.

Dynatrace Named a Winner in the 2024 Microsoft Americas Partner of the Year Awards

Posted in Commentary with tags on June 28, 2024 by itnerd

Dynatrace today announced it has been recognized as the winner of the 2024 Microsoft Americas Partner of the Year Award in the Commercial Marketplace, Canada category. The company received recognition among a group of top Microsoft partners for demonstrating innovation and successfully delivering customer solutions using Microsoft technologies.

The Microsoft Americas Partner of the Year Awards acknowledge Microsoft partners who have created and delivered exceptional Microsoft-based solutions, services, and devices in the past year. The award selections are categorized, with honorees selected from a pool of over 2,000 submitted nominations, and Dynatrace was recognized for providing outstanding solutions and services in the Commercial Marketplace category for Canada. Dynatrace was also named a winner of the Commercial Marketplace category for LATAM in addition to being acknowledged as a finalist for the ISV Innovator Award – Canada.

The Microsoft Partner of the Year Awards will be announced at the Americas Start for Partners, a digital event, which will take place on July 12 this year. Additional details on the 2024 awards are available on the Microsoft Americas Partner Blog.

To learn more about Dynatrace’s recognition in this year’s Microsoft Partner of the Year Awards, see the Dynatrace blog, Dynatrace recognized in the 2024 Microsoft Partner of the Year Awards.