AusCERT Week in Review for 22nd September 2017 22 Sep 2017
AusCERT Week in Review
22 September 2017
As Friday 22nd of September comes to a close, the big news is:
AusCERT is hiring!
Apply here: https://www.seek.com.au/job/34448215
Here is our weekly summary (including excerpts) of some of the more interesting stories we've seen this week:
Title: CCleaner malware spread via supply chain attack
Date: 19 September 2017
Author: Michael Heller
"CCleaner malware was spread to users via an infected software update for close to one month, highlighting the dangers of supply chain attacks and the need for code signing.
The CCleaner malware gathered information about systems and transmitted it to a command and control (C&C) server; it was reportedly downloaded by users for close to one month from Aug. 15 to Sept. 12, according to Morphisec. However, Avast noted that the CCleaner malware was limited to running on 32-bit systems and would only run if the affected user profile had administrator privileges."
Title: Apache "Optionsbleed" vulnerability - what you need to know
Date: 19 September 2017
Author: Paul Ducklin
"Remember Heartbleed? ... Well, something similar has happened again.
This time, the bug isn't in OpenSSL, but in a program called httpd, probably better known as the Apache Web Server, and officially called the Apache HTTP Server Project.
The vulnerability has been dubbed OptionsBleed, because the bug is triggered by making HTTP OPTIONS requests."
Title: Here's What Your Identity Sells For on the Dark Web
Date: 15 September 2017
Author: Suzanne Woolley
"How much is your personal data worth to you? A lot. (Thanks, Equifax.) And how much is it worth to an identity thief?
You may be surprised, or insulted, or enraged, to find out."
Title: Internet Providers Possibly Involved in FinFisher Surveillance Operations: Report
Date: 21 September 2017
Author: Ionut Arghire
"New campaigns featuring the infamous FinFisher spyware are using a previously unseen infection vector, strongly suggesting that Internet service providers (ISPs) might be involved in the distribution process, ESET security researchers warn.
Also known as FinSpy, the malware has been around for over half a decade and is being sold exclusively to governments and their agencies worldwide for surveillance purposes. The use of this lawful interception solution has increased, and researchers observed it earlier this month abusing a .NET framework zero-day tracked as CVE-2017-8759 for distribution. "
Title: Government promises $50 million boost to security research
Date: 22 September 2017
Author: Rohan Pearce
"The government will invest $50 million over seven years to help establish an industry-led Cyber Security Cooperative Research Centre (CRC).
The government said that cash and in-kind contributions of more than $89 million towards the CRC had been pledged by 25 industry, research and government partners."
And lastly, here are this week's noteworthy security bulletins (in no particular order):
"..the Apache HTTP Server incorrectly handled Limit directives in .htaccess files. In certain configurations, a remote attacker could possibly use this issue to read arbitrary server memory, including sensitive information. This issue is known as Optionsbleed."
Two of the big three CMS released major patch updates this week - Joomla! and Wordpress. Wordpress vulnerabilities include multiple Cross-site scripting, path traversal, open redirect and a potential SQL injection via plugins and themes.
AusCERT recommends members avoid using Joomla! because of its history of serious vulnerabilities including this latest round.
Vendors and Linux distributions were quick to release patches for the latest samba vulnerabilities.
A man-in-the-middle attack can potentially read and alter documents transferred via a client connection.
Also, a client with write access to a share can cause the server memory contents to be written to a file or printer.
Update your Google and Apple Safari browsers before you surf the web this weekend. Both Google Chrome and Apple Safari have addressed vulnerabilities in their latest updates.
Wishing you the best from AusCERT and stay safe,
« Back to all blog entries