Weekly InfoSec News Brief April 6-12

Critical Apple Mac OSX Update Released for Yosemite Only

Apple released an update last Wednesday for OSX (version 10.10.3) that fixes a number of serious security vulnerabilities. The most serious is CVE-2015-1130, which could allow any user to obtain root privileges to the system. The vulnerability is present in version of OSX since at least 2011, but Apple has not issued a patch for older versions prior to Yosemite. If you haven't upgraded your Macs to the latest OS version, you should strongly consider doing so now.
http://www.eweek.com/security/apple-patches-critical-backdoor-flaw-in-os-x-10.10.3.html
https://support.apple.com/en-us/HT204659


Major Malicious Advertising Campaign Hits Google Ad Network

A Google advertising partner, Engage Lab, was exploited last Tuesday, causing all of their advertisements to redirect users to a site running the "Nuclear" exploit kit. This exploit kit attempts to infect visitors' computers via Flash, Java, or Silverlight vulnerabilities. Malicious advertising is a growing problem as advertising is ubiquitous and widespread, and exploiting advertising is a method for attacker to hit visitors at reputable, trusted sites.
http://www.pcworld.com/article/2907492/largescale-google-malvertising-campaign-hits-users-with-exploits.html
Technical details: http://blog.fox-it.com/2015/04/07/liveblog-malvertising-from-google-advertisements-via-possibly-compromised-reseller/


"Drive-by Login" Attack Targets Specific Users When Visiting a Site

Web-based, browser-based attacks are increasingly a focus today, and the "drive-by login" attack is a new variation on this theme. Unlike "watering hole" attacks that hit all visitors to a site, "drive-by login" attacks monitor visitors waiting for a specfic user to log in to the site. In a targeted attack, the attackers would need to know (or discover) what sites a person frequents in order to compromise one of those and wait for the user to log in.
http://www.scmagazine.com/high-tech-bridge-identifies-new-attack-method-possibly-used-by-apts/article/407805/


*************
The last two items demonstrate the theme that "no one is safe" and "no website is safe" on the Internet today. One of the most critical defensive measures that organizations must have is to ensure that users DO NOT browse the web using accounts with administrative privileges. Even system administrators should not do so -- they should browse and read email using a non-privileged account and use their separate, privileged account only for those functions which require it.

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February