Weekly Infosec News Brief – Mar 23-29, 2015

Recently-Patched Flash Vulnerability Being Actively Exploited

A vulnerability in Adobe Flash (CVE-2015-0336) that was fixed on March 12 is now being actively exploited in drive-by download attacks as part of the Nuclear exploit kit. The recent trend has been that exploits for Flash vulnerabilities are being used in the wild within a shorter timeframe of the flaws being publicly announced and fixes being made available, sometimes before. The need to install Flash updates as soon as possible after they are released has never been more clear.
http://www.computerworld.com/article/2899702/new-attacks-suggest-timeline-for-patching-flash-player-is-shrinking.html


New Jersey School District Recovering from Ransomware Attack

The Swedesboro-Woolwich School District in New Jersey had to take many of their systems offline for an extended period after many files were encrypted by a ransomware infection. The district was able, after several days’ work, to clean malware from their servers and restore most of the affected files from backups. The threat of ransomware is yet another reason for limiting who has direct access to what files via file shares. Web-based document management systems or SharePoint-type systems are far less susceptible to these threats. Also note that good backups saved this school district. Keep in mind, however, that if your backups are accessible to the file system you may turn to your backups after a ransomware incident only to find that your backups are also encrypted!
http://www.nj.com/gloucester-county/index.ssf/2015/03/school_district_bitcoin_hostage_situation_continue.html


New York Requiring Insurers to Report Their Cybersecurity Preparations

Insurers doing business in New York are being required to provide information to the state regarding their cybersecurity preparations, and the state plans to conduct examinations of insurers’ systems to verify their preparations. Organizations that hold any significant quantities of customers’ personal and financial information should anticipate that they are likely to become subject to similar regulatory measures in the near future.
http://www.bloomberg.com/news/articles/2015-03-26/new-york-to-investigate-insurers-cybersecurity-work-after-hacks


Flaw in Hotel WiFi Routers Puts Guests’ Systems and Data at Risk

A major vulnerability was discovered in a wifi router system (InnGate routers, made by ANTlabs of Singapore) commonly used in major hotel chains. This vulnerability could allow attackers to take over the routers, and from there they could monitor or alter communications to and from guests’ computers, and could redirect guests to malware sites or insert malicious code into their communications. The best defense against this kind of attack is to train your users to always use a VPN (with no split tunneling) whenever working from an untrusted network (any network you or your organization don’t control).
http://www.wired.com/2015/03/big-vulnerability-hotel-wi-fi-router-puts-guests-risk/

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Critical Vulnerability Discovered in IIS 6.0 Web Services