Weekly Infosec News Brief: 04-10 April

Zero-Day Flash Vulnerability Announced, Patch Available

A new vulnerability (CVE-2016-1019) in Adobe Flash was announced last week; the vulnerability is being actively exploited to install malware on vulnerable computers. Adobe stated that their latest update released in March prevents the worst type of damage from this vulnerability, such that most exploitations attempts will result only in a crash rather than remote code execution. On Thursday, Adobe released a patch to fix the vulnerability. The patched version is 21.0.0.213, and you can check if you have the latest version installed by visiting <a href=" flash="" http:="" products="" www.adobe.com=""> this link . Keep in mind that different browsers may have separate installations of Flash, so you should check with all browsers on your system(s).
http://www.eweek.com/security/adobe-working-on-zero-day-pwn2own-patches-for-flash.html
https://helpx.adobe.com/security/products/flash-player/apsa16-01.html
https://helpx.adobe.com/security/products/flash-player/apsb16-10.html


FBI Issues New Warning on Email-Based Wire Fraud

Last Monday the FBI posted a new warning regarding a dramatic increase in "business email compromise," or "CEO Email Fraud" attacks. This form of attack involves attackers sending fake messages to company personnel, typically accounting personnel, purporting to be from the CEO and instructing them to make large wire transfers. In some cases, these attempts are facilitated by the compromise of organizational email systems, so that the fake messages originate from the CEO's actual email account. These types of attacks have led to approximately $2.3B in losses to US organizations in the last three years. Organizations need to ensure that personnel are aware of this fraud trend and that procedural controls are in place to verify all requests for financial transactions.
https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams


WordPress, Drupal, and Joomla Sites Falling Victim to Attacks

Most organizational and other websites today are built around some form of web-based content management system (CMS). These systems allow users to update the website by logging into an administrative web interface, and greatly ease the task of maintaining a web site. However, these systems all have a history of significant vulnerabilities ranging from those that might allow an attacker to make unauthorized alterations to a website to vulnerabilities that could allow and attacker to take full control of the web server and use it to attack other parts of the organization's network. One recent ransomware attack at a Canadian hospital appears to have been facilitated by a website running an outdated version of the Joomla CMS. Also, the hack of the Mossack Fonseca law firm in Panama (which led to the "Panama Papers" disclosures) appears to have possibly been carried out through an outdated Drupal-powered website. Organizations running these or other web-based CMS software should ensure that they stay aware of software updates available for their software and promptly install all security-related updates.
https://blog.malwarebytes.org/security-world/2016/03/canadian-hospital-serves-ransomware-via-hacked-website/
http://www.scmagazine.com/pros-examine-mossack-fonseca-breach-wordpress-plugin-drupal-likely-suspects/article/488697/
http://www.zdnet.com/article/wordpress-joomla-domains-under-attack-through-jquery-security-flaw/


Google Improves Free Network Security Monitoring Service

Google began offering their Safe Browsing Alerts for Network Administrators tool five years ago. Last week Google announced further improvements to this service, which alerts network administrators to the presence of malicious URLs and links within their networks. These are often early indicators of breaches of web servers, among other forms of attacks. Admins can begin receiving alerts by registering their networks here.


Construction Firms Warns of Employee Data Compromise Through Corporate Tax Vendor

A breach announcement was made last week by Whiting-Turner, a Maryland-based construction firm. They stated that their corporate tax vendor had been compromised, and that employees' personal information (names, SSNs, data of birth, etc.) were taken. This event was followed by a rash of fraudulent tax filings in the names of employees and employees' children. Fraudulent tax filings are a common method used by criminals to monetize stolen personal information. The firm is offering free credit monitoring to victims. This incident highlights the need for organizations to ensure that any third party with whom they are entrusting sensitive information is using adequate data protection practices.
http://www.csoonline.com/article/3053658/security/latest-tax-related-data-breach-could-affect-employees-and-their-children.html

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Critical Vulnerability Discovered in IIS 6.0 Web Services