Another year commences with more software patching

Posted by Clayton Bellot on January 23, 2015
Uncategorized / No Comments

A week after Adobe, Microsoft, and Mozilla announced several patches to address multiple vulnerabilities, Google’s Chrome announced it’s own update to patch 62 security issues. Coincidentally, Adobe released an additional “out of band” update for it’s Flash Player with another patch to be released the next week to address a secondary issue.

Apple Addresses WireLurker Malware

Posted by Clayton Bellot on November 07, 2014
Uncategorized / No Comments

By now, you may have heard about one of the latest instances of malware to effect Apple’s operating systems. This malware dubbed WireLurker has shown that there is an increased movement in targeting Apple users who for years have indicated that Macs just don’t get viruses. The articles below also point out the dangers of jailbreaking a phone and installing third-party apps and run an up-to-date antivirus on Mac operating systems.

http://www.computerworld.com/article/2844700/the-iphone-wirelurker-malware-what-you-need-to-know.html

http://www.scmagazine.com/the-command-and-control-server-for-wirelurker-has-been-taken-offline/
Below are recommendations provided by Palo Alto Networks to help prevent WireLurker and similar threats:

  • Employ an antivirus or security protection product for the Mac OS X system and keep its signatures up-to-date
  • In the OS X System Preferences panel under “Security & Privacy,” ensure “Allow apps downloaded from Mac App Store (or Mac App Store and identified developers)” is set
  • Do not download and run Mac applications or games from any third-party app store, download site or other untrusted source
  • Keep the iOS version on your device up-to-date
  • Do not accept any unknown enterprise provisioning profile unless an authorized, trusted party (e.g. your IT corporate help desk) explicitly instructs you to do so
  • Do not pair your iOS device with untrusted or unknown computers or devices
  • Avoid powering your iOS device through chargers from untrusted or unknown sources
  • Similarly, avoid connecting iOS devices with untrusted or unknown accessories or computers (Mac or PC)
  • Do not jailbreak your iOS device; If you do jailbreak it, only use credible Cydia community sources and avoid the use or storage of sensitive personal information on that device

Additionally, it should be noted that there is a variant of this malware available for Windows and that Palo Alto Networks has provided a tools on their GitHub site to detect WireLurker for both Mac OS X and Windows operating systems.

Adobe Flash and Air Vulnerability

Posted by Clayton Bellot on October 24, 2014
Uncategorized / No Comments

On October 14th, Adobe released security fixes for an issue in Adobe Flash Player version 15.0.0.167 and earlier (the current Mac and Windows version as of this posting is 15.0.0.189 and version 11.2.202.411 for Linux users). The impact of this vulnerability could allow an attacker to take control of an affected system and be exploited during a drive-by download attack. This type of attack can happen by visiting a malicious website viewing an email message with embedded multimedia or clicking on a deceptive pop-up window.

Please visit http://helpx.adobe.com/flash-player.html to check to see if your computer is impacted. If you need to take action, you will be prompted to update your version of Flash.

For Google Chrome users, patches for Adobe Flash have been incorporated into the latest release of the browser and will be updated automatically.

As for Adobe Air, users are able to check their version by following the instructions provided on Adobe’s website at http://helpx.adobe.com/air/kb/determine-version-air-runtime.html. If you are unable to verify the version trough this method, double-check to see if to see if the software is even installed via the Control Panel in Windows or in the Application/Utilities folder on a Mac. If Adobe Air isn’t present in either of these instances, you will still need to verify your version of Adobe Flash.

Microsoft releases patch to fix “Sandworm”

Posted by Clayton Bellot on October 15, 2014
Uncategorized / No Comments

Microsoft released patch KB300869 to address CVE-2014-4114 which allows an attacker who successfully exploits this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Windows users are asked to update their there systems immediately:

Windows 7
http://windows.microsoft.com/en-us/windows7/install-windows-updates

Windows8 and 8.1
http://windows.microsoft.com/en-us/windows-8/windows-update-faq

Once the latest patches have been installed, system owners can verify that the patch has been applied by pasting the following line into a command line window (Start; goto Run; and type: cmd.exe; hit Enter)

wmic qfe list brief | find “KB3000689”

The expected output should look like:

Capture

For more information about this vulnerability:

http://www.isightpartners.com/2014/10/cve-2014-4114/

 

 

Yahoo Confirms Infected Servers Unrelated to Shellshock

Posted by Clayton Bellot on October 07, 2014
Uncategorized / No Comments

Yahoo CISO Alex Stamos refuted claims made by a Louisiana security company that a number of Yahoo servers had been compromised by Romanian hackers using Shellshock exploits against the vulnerability in Bash.

Stamos said three Yahoo Sports API servers were infected with malware by hackers looking for webservers vulnerable to the Shellshock vulnerability, but the exploits were not related to Shellshock. Those servers, which provide live game streaming, do not store user data and were isolated upon discovery of malware, Stamos said.

http://threatpost.com/yahoo-confirms-infected-servers-unrelated-to-shellshock/108726

Internet2 Shellshock Update

Posted by Clayton Bellot on October 07, 2014
Uncategorized / No Comments

Internet2 is actively monitoring and assessing shellshock’s impact on the Internet2 community and working with its partners to rapidly update open source development packages it supports.

https://www.internet2.edu/products-services/support/internet2-shellshock-update/

Data breach that hit Jimmy John’s is larger than first thought

Posted by Clayton Bellot on September 29, 2014
Uncategorized / No Comments

Computerworld magazine posted in an article on September 26, that the number of stores effected by this breach had increased from 108 to 216 (http://www.computerworld.com/article/2687802/data-breach-that-hit-jimmy-johns-is-larger-than-first-thought.html?source=CTWNLE_nlt_security_2014-09-29#tk.rss_security0).

Jimmy John’s as released a statement addressing this issue and provided a utility to search store location effected by this incident of which two location are in Springfield:

https://www.jimmyjohns.com/datasecurityincident/storedates.html

 

Bourne Again Shell (Bash) Remote Code Execution Vulnerability

Posted by Clayton Bellot on September 25, 2014
Uncategorized / No Comments

US-CERT is aware of a Bash vulnerability affecting Unix-based operating systems such as Linux and Mac OS X. Exploitation of this vulnerability may allow a remote attacker to execute arbitrary code on an affected system.

https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability

ITS to begin assigning SHA-2 Certificates

Posted by Clayton Bellot on September 24, 2014
Uncategorized / No Comments
Microsoft, Google, and Mozilla have all announced that they will stop accepting SHA-1 signed certificates in the near future. Existing certificates which expire after January 1, 2016 will potentially encounter this issue and should be reissued before January 1, 2016. This will affect all certificate types, including code signing certificates.
To address this issue, all InCommon server certificates issued by ITS as of September 24, 2014, will use SHA-2 hashes by default.

Apple’s iOS 8 fixes enterprise Wi-Fi authentication hijacking issue

Posted by Clayton Bellot on September 24, 2014
Uncategorized / No Comments

Apple’s iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks.

http://www.cio.com/article/2686514/apples-ios-8-fixes-enterprise-wifi-authentication-hijacking-issue.html?source=CIONLE_nlt_enterprise_2014-09-24#tk.rss_patches