Template:HNNPaul240

From Paul's Security Weekly
Jump to: navigation, search
  1. Solar, Wind Power Utility Disrupted in Rare Cyberattack - sPower, a Utah-based wind and solar provider, began experiencing a series of lost connections between its main control center and remote power-generation sites. The brief, intermittent periods of downtime were determined to be the result of a denial-of-service (DoS) attack, according to documents obtained via the Freedom of Information Act (FOIA) by E&E News, a utility-industry trade publication. That operational disruption makes the attack the first of its kind in the country. “This disrupted the organization’s ability to monitor the current status of its power-generation systems. The utility industry refers to this type of incident as ‘loss of view,'” explained Phil Neray, vice president of industrial cybersecurity at CyberX, in an interview with Threatpost.
  2. Thousands of Xiaomi FURRYTAIL pet feeders exposed to hack - There are two vulnerabilities here, one seems to be an API that does not have authentication, allowing remote attackers to change the feeding schedule, and an exploitable WiFi driver: The researcher explained that the devices were exposed online without authentication, she was able to change feeding schedules. The expert also discovered that the devices were also using the Wi-Fi ESP8266 chipset that is affected by a flaw that could be exploited by an attacker to download and install new firmware, and reboot Xiaomi FurryTail pet feeders.
  3. QSnatch malware already infected thousands of QNAP NAS devices - Attackers are infecting firmware using techniques I discussed several years ago: “The original infection method remains unknown, but during that phase malicious code is injected to the firmware of the target system, and the code is then run as part of normal operations within the device. After this the device has been compromised. The malware uses domain generation algorithms to retrieve more malicious code from C2 servers.” At the time the infection vector is still unclear, once the malware access to a vulnerable device the malicious code is injected into the firmware to gain reboot persistence.
  4. This aggressive IoT malware is forcing Wi-Fi routers to join its botnet army | ZDNet - And the armies are fighting: In all cases, the malware is using a scanner function to find units facing the open internet before taking advantage of vulnerabilities to compromise them. The new attacks have been detailed by cybersecurity researchers at Palo Alto Networks. The Gafgyt botnet appears to be directly competing with another botnet – JenX – which also targets the Huawei and Realtek routers, but not Zyxel units. Ultimately, the attackers behind Gafgyt want to kill off their competition by replacing JenX with their own malware. "The authors of this malware want to make sure their strain is the only one controlling a compromised device and maximizing the device's resources when launching attacks," Asher Davila, security researcher at the Palo Alto Networks Unit 42 research division, told ZDNet. "As a result, it is programmed to kill other botnet malware it finds, like JenX, on a given device so that it has the device's full resources dedicated to its attack".
  5. On Halloween night, Google discloses Chrome zero-day exploited in the wild | ZDNet - late Halloween night, Google engineers delivered the best scare of the evening and released an urgent update for the Chrome browser to patch an actively exploited zero-day. "Google is aware of reports that an exploit for CVE-2019-13720 exists in the wild," Google engineers said in a blog post announcing the new v78.0.3904.87 release. The actively-exploited zero-day was described as a use-after-free bug in Chrome's audio component. Use-after-free vulnerabilities are memory corruption bugs that occur when an application tries to use memory space that is no longer assigned to it, after being freed and assigned to another app. This usually causes a program to crash, but can also sometimes lead to other, unintended consequences, such as code execution scenarios.
  6. First Bluekeep Exploit Found in the Wild - Bluekeep is, of course, the "RDP vulnerability" is being exploited in the wild: Kevin Beaumont (@GossiTheDog), who discovered Bluekeep, found the exploit when his Bluekeep honeypots began crashing this past weekend. He shared his data with researcher Marcus Hutchins, who verified the results. In analyzing the code crashing the honeypots, Hutchins found the obfuscated payload ultimately installed a cryptocurrency miner on the victim system. "It is curious that this publicly known wormable vulnerability, known to everyone who would care to know for at least six months, took this long to get detectably weaponized," Hutchins wrote in a blog post sharing the exploit's analysis.
  7. PoC Exploits Published for Unpatched RCE Bugs in rConfig | SecurityWeek.Com - An open source network device configuration management utility, rConfig provides network engineers with the ability to take snapshots of routing tables, MACs, and running configurations, among others, and can also help improve overall network security. rConfig is impacted by two remote code execution (RCE) vulnerabilities, one unauthenticated (CVE-2019-16662) and another authenticated (CVE-2019-16663), penetration tester Mohammad Askar explains. I've reviewed the published exploit code and it appears these are failry simple remote command injection vulnerabilities, of course the unauthenticated one is pretty bad. No patches have been issues and rConfig developers were notified in September.
  8. Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam - The attack, dubbed “light commands,” leverages the design of smart assistants’ microphones. These are called microelectro-mechanical systems (MEMS) microphones, which work by converting sound (voice commands) into electrical signals – but in addition to sound, researchers found that MEMS microphones also react to light being aimed directly at them. Researchers said that they were able to launch inaudible commands by shining lasers – from as far as 110 meters, or 360 feet – at the microphones on various popular voice assistants, including Amazon Alexa, Apple Siri, Facebook Portal, and Google Assistant.