Posts

BF-SIRT Newsletter 2018-21

BUG in GIT opens developers systems up to attack.

Git repository hosting services GitHub, GitLab and Microsoft VSTS each patched a serious vulnerability on Tuesday that could lead to arbitrary code execution when a developer uses a malicious repository.

Developers behind the open-source development Git tool pushed out Git 2.17.1, addressing two bugs (CVE-2018-11233 and CVE-2018-11235).

“These are tricky vulnerabilities that will require the Git hosting services to patch, but also individual developers who are using the tool,” said Tim Jarrett, senior director of security, Veracode.

Of the two vulnerabilities, CVE-2018-11235 is the most worrisome, researchers said.

The vulnerability is described as a submodule configuration flaw that surfaces when the Git submodule configuration is cloned. Git provides developers with post-checkout hooks, which are executed within the context of the project. Those hooks can be defined within the submodules, and submodules can be malicious and directed to execute code.

“The software does not properly validate submodule ‘names’ supplied via the untrusted .gitmodules file when appending them to the ‘$GIT_DIR/modules’ directory. A remote repository can return specially crafted data to create or overwrite files on the target user’s system when the repository is cloned, causing arbitrary code to be executed on the target user’s system,” according to a SecurityTracker description of the flaw.

Top 5 Security links

European Commission “doesn’t plan to comply with GDPR” – well, sort of
PCI Security Standards Council publishes PCI DSS 3.2.1
Google patches 34 browser bugs in chrome67, adds spectre fixes
How to turn PGP back on as safely as possible
Research shows 75% of ‘open’ Redis servers infected

BF-SIRT Newsletter 2018-20

VIRGINIA TECH AND DASHLANE ANALYSIS FIND RISKY, LAZY PASSWORDS THE NORM

Dashlane analyzed over 61 million passwords and uncovered some troubling password patterns. The analysis was conducted with research provided by Dr. Gang Wang, an Assistant Professor in the Department of Computer Science at Virginia Tech.

The Virginia Tech project, described as “the first large-scale empirical analysis of password reuse and modification patterns…” resulted in a landmark research paper: “The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.” Dr. Wang granted Dashlane’s Analytics Team access to the anonymized version of the 61.5 million passwords from the project so they could conduct further research into password trends.

Top 5 Security links

Amazon comes under fire for facial recognition platform
New VPNFilter malware targets at least 500K networking devices worldwide
Why not to use sha256crypt  or sha512crypt they’re dangerous
Intel’s ‘virtual fences’ spectre fix won’t protect against variant 4
The good and bad news about blockchain security

BF-SIRT Newsletter 2018-19

Not So Pretty: What You Need to Know About E-Fail and the PGP Flaw

Don’t panic! But you should stop using PGP for encrypted email and switch to a different secure communications method for now.

A group of researchers released a paper today that describes a new class of serious vulnerabilities in PGP (including GPG), the most popular email encryption standard. The new paper includes a proof-of-concept exploit that can allow an attacker to use the victim’s own email client to decrypt previously acquired messages and return the decrypted content to the attacker without alerting the victim. The proof of concept is only one implementation of this new type of attack, and variants may follow in the coming days.

Top 5 Security links

Critical Linux flaw opens the door to full root access

Multi-stage email word attack without macros

GDPR phishing scam targets apple accounts

Hardcoded password found in Cisco Enterprise software, again

Another severe flaw in Signal desktop app

BF-SIRT Newsletter 2018-18

TWITTER URGES USERS TO CHANGE PASSWORDS DUE TO GLITCH

Twitter said Thursday that a glitch caused account passwords to be stored in plain text on an internal log, sending users across the platform scrambling  to change their passwords.

The social media company said that it found and has fixed the glitch, and its investigation shows no indication of a breach or misuse by anyone. While the company did not specify how many passwords were impacted, a Reuters report pegged the number at more than 330 million.

“I’d emphasize that this is not a leak and our investigation has shown no signs of misuse,” a Twitter spokesperson told Threatpost. “We’re sharing this information so everyone can make an informed decision on the security of their account.

Top 5 Security links
Meow, click me , Meow
Facebook’s getting a clear history button
Medical devices vulnerable to KRACK Wi-Fi attacks
Security Trade-Offs in the new EU privacy law
Glitch: new ‘Rowhammer’ attack can remotely hijack Android phones

BF-SIRT Newsletter 2018-17

Know what Instagram knows – here’s how you download your data

Instagram, the visual story-centric social media platform owned by Facebook, has now added a long-requested feature: the ability for users to download their data – including images, posts and comments.

Not to be cynical, but Instagram is not making this move out of the kindness of its heart: the compliance deadline for GDPR is in a month and data portability is one of its many requirements.

Top 5 Security links
Biggest marketplace selling internet paralysing ddos attacks taken down
F-secure hack unlocks millions of hotel rooms with handheld device
When your CA turns against you
Pyromine uses nsa exploit for monero mining and backdoors

Apples latest updates are out apfs password leakage bug squashed

BF-SIRT Newsletter 2017-13

The top stories from this week is that Google will be reducing trust in Symantec certificates following numerous slip-ups. Also, VMware’s reported three bugs that probably deserve your urgent attention.

You can also read about the black box discovery of memory corruption RCE on box.com, and the update from Apple that patches a large number of flaws in iOS and macOS.

Top 5 Security Links
Google Reducing Trust in Symantec Certificates Following Numerous Slip-Ups
It’s ESXi time for critical VMware patches
Black box discovery of memory corruption RCE on box.com
Apple Patches Large Number of Flaws in iOS, macOS Updates
IIS 6.0 Vulnerability Leads to Code Execution

BF-SIRT Newsletter 2017-12

The top stories from this week is that US Senate just voted to let ISPs sell your web browsing data without permission. We also have information about the Apple iCloud ransom demands.

You can also read about how hackers are using fake cellphone towers to spread android banking trojan or about the critical Lastpass vulnerability.

Top 5 Security Links
US Senate Just Voted to Let ISPs Sell Your Web Browsing Data Without Permission
Apple iCloud ransom demands: The facts you need to know
Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan
Critical bugs for Lastpass found in Chrome, Firefox add-ons
Easy Way to Hijack Privileged Windows User Session Without Password