Customer portal
Articles Tagged with

SOS Intelligence

"10
Opinion, SME Cybersecurity

10 Cybersecurity Best Practices Every SME Should Implement

In today’s rapidly evolving digital landscape, small and medium-sized enterprises (SMEs) are no longer under the radar of cybercriminals. These businesses are often seen as attractive targets due to perceived weaker defences compared to large corporations. The consequences of a cyberattack can be devastating, from financial losses to long-lasting reputational damage. However, by adopting a proactive approach to cybersecurity, SMEs can significantly reduce their risk of falling victim to such threats.

This blog outlines 10 essential cybersecurity best practices that every SME should implement. These actionable steps can help you strengthen your organisation’s cyber resilience, protect sensitive data, and ensure business continuity.

1. Employee Training and Awareness
The most common entry point for cyberattacks is not some sophisticated hacking tool but the employees themselves. Phishing, social engineering, and inadvertent downloads of malware all stem from human error, which is why employee training is critical. Cybercriminals know this and increasingly target SMEs through schemes that exploit untrained or unaware staff.

Action Steps:

  • Conduct Regular Training: Training should not be a one-time affair. Cyber threats are constantly evolving, so your staff must receive up-to-date information about new scams and vulnerabilities. Tailor your training to different roles within your organisation. For example, your finance team may be more prone to business email compromise scams, while your marketing team may encounter phishing attempts through social media.
  • Phishing Simulations: Consider running phishing simulations to test your staff’s response to phishing emails. This not only highlights potential areas for improvement but also makes employees more vigilant in their day-to-day activities.
  • Clear Reporting Channels: Ensure that there are clear channels for reporting suspicious activity. Often, employees may be unsure of whom to contact or may be afraid of reporting a potential mistake. Encourage an open and blame-free environment where cybersecurity concerns are taken seriously.

In addition to this, fostering a company-wide culture that prioritises cybersecurity can reduce risks. When employees recognise their role in defending the company, they’re less likely to make mistakes that can lead to costly breaches.

2. Implement Strong Password Policies

Weak passwords are akin to leaving the front door to your business unlocked. Cybercriminals often use automated tools to guess passwords, known as brute force attacks, or simply gain access through poor password hygiene. For SMEs, password strength must be a cornerstone of your cybersecurity strategy.

10 Cybersecurity Best Practices Every SME Should Implement

Action Steps:

  • Enforce Password Complexity: Require passwords to be at least 12 characters long and include a mix of upper- and lowercase letters, numbers, and special characters. Simplicity is the enemy of security, and passwords like ‘123456’ or ‘password’ should never be allowed.
  • Password Manager Implementation: Encourage the use of a password manager. These tools generate and store complex passwords securely, eliminating the need for employees to memorise multiple passwords or, worse, write them down.
  • Multi-Factor Authentication (MFA): Two-factor authentication adds a second layer of security, often in the form of a one-time code sent to a mobile device. This ensures that even if a password is compromised, a second factor is required for access.

Furthermore, you should implement a policy that requires periodic password changes, especially for critical systems. Though some argue that frequent password changes can lead to poor practices (such as choosing weaker passwords), pairing this with MFA and using a password manager mitigates these risks.

3. Use Firewalls and Antivirus Software

Think of a firewall as your first layer of defence against external threats. It acts as a gatekeeper, monitoring incoming and outgoing network traffic and blocking potentially harmful data from entering your system. Paired with antivirus software, firewalls help ensure that malware and other malicious activities are stopped before they cause damage.

10 Cybersecurity Best Practices Every SME Should Implement

Action Steps:

  • Set Up Network Firewalls: Ensure your company has a firewall in place to protect the network perimeter. It’s also important to configure internal firewalls to separate sensitive data and systems, reducing the potential damage if a breach occurs.
  • Use Endpoint Protection: Equip all devices, from workstations to mobile devices, with endpoint security solutions. These solutions typically include antivirus, anti-malware, and firewall protections, which provide an additional security layer for individual devices.
  • Regular Updates and Patching: Both firewalls and antivirus software need regular updates to keep up with new threats. Malware evolves constantly, and outdated security software can leave your systems vulnerable.

In addition to traditional firewalls, SMEs can also benefit from Web Application Firewalls (WAFs), especially if they host websites or web applications. These firewalls help protect against common web-based attacks such as SQL injections and cross-site scripting.

4. Regular Data Backups

Data loss can happen for many reasons—ransomware attacks, hardware failures, or even human error. When it does, the consequences can be dire, especially if your business relies on this data for daily operations. Having a robust backup strategy ensures that even if data is lost, your business can recover with minimal disruption.

Action Steps:

  • Backup Frequency: Aim to back up your business-critical data daily. If daily backups aren’t feasible, establish a schedule that ensures minimal data loss in the event of a breach. Weekly full backups combined with daily incremental backups can offer a good balance between resource use and recovery needs.
  • Offsite and Cloud Backups: It’s important to store backups in more than one location. Use both onsite (e.g., external hard drives) and offsite solutions, such as cloud-based storage, to ensure redundancy. Cloud backups are particularly useful as they offer rapid recovery options and are often encrypted for extra security.
  • Test Your Backups: Regularly test your backups by performing a full restoration to ensure they’re functioning properly. A backup is only useful if it can be restored quickly and completely in the event of a disaster.

An often overlooked aspect of the backup strategy is ensuring that the backup data itself is secure. Implement encryption and access controls to ensure that even if the backup is compromised, the data cannot be easily accessed by attackers.

5. Keep Software and Systems Updated

Outdated software is a hacker’s dream. Unpatched vulnerabilities provide cybercriminals with an easy way into your systems, making regular software updates one of the most basic but effective ways to enhance your security posture. For SMEs, who may not have the resources for dedicated IT staff, this is especially important.

10 Cybersecurity Best Practices Every SME Should Implement

Action Steps:

  • Automate Software Updates: Enable automatic updates for all software, including operating systems, web browsers, and applications. This ensures that your systems are always protected against the latest threats.
  • Patch Management Strategy: Implement a formal patch management process to track and apply critical updates. This includes not only operating systems but also third-party applications, plugins, and hardware firmware.
  • Update Legacy Systems: If your business relies on legacy systems that are no longer supported by the vendor, consider replacing them or isolating them from the rest of the network. Unsupported systems are particularly vulnerable because they no longer receive security patches.

Furthermore, it’s important to stay informed about vulnerabilities in widely used software. Cybercriminals are quick to exploit known vulnerabilities in popular software like Microsoft Office or Adobe products, so prompt patching is key to mitigating these risks.

6. Encrypt Sensitive Data

Encryption is a fundamental tool for protecting your company’s sensitive information. Whether it’s customer data, financial records, or intellectual property, encryption ensures that even if your data falls into the wrong hands, it cannot be easily read or misused.

Action Steps:

  • Full-Disk Encryption: Implement full-disk encryption on all company devices, including laptops and mobile phones. This ensures that if a device is lost or stolen, the data remains inaccessible without the correct decryption key.
  • Encrypt Data in Transit and at Rest: Use encryption protocols such as SSL/TLS to protect data being transmitted over the internet, whether via email, cloud storage, or internal networks. Similarly, ensure that data stored on servers or backup systems is encrypted.
  • Encryption Key Management: Properly manage your encryption keys, ensuring they are securely stored and regularly rotated. A compromised key can render your encryption useless, so keys must be handled with care.

In addition to encrypting sensitive business data, SMEs should also consider encrypting employee communications. Using secure email services or encrypted messaging platforms can protect sensitive conversations from being intercepted by attackers.

7. Develop an Incident Response Plan

No cybersecurity strategy is complete without an incident response plan. This plan outlines the steps your business will take in the event of a cyberattack or data breach, ensuring that your team can act swiftly to mitigate damage and recover quickly.

Action Steps:

  • Document Roles and Responsibilities: Your incident response plan should clearly define the roles and responsibilities of key personnel during a cybersecurity incident. This includes who will communicate with stakeholders, who will handle technical remediation, and who will contact law enforcement if necessary.
  • Regular Drills: Run regular incident response drills to simulate real-life cyberattacks. This helps employees become familiar with their roles and responsibilities during an incident, reducing panic and confusion when a real attack occurs.
  • Post-Incident Review: After an incident has been resolved, conduct a post-mortem analysis to identify what went wrong, what was handled well, and how your response plan can be improved in the future.

A well-prepared incident response plan can be the difference between a minor incident and a full-scale disaster. Regular updates and testing of the plan are crucial to ensure it remains effective as new threats emerge.

8. Secure Mobile Devices

Mobile devices have become indispensable tools for business, but they also pose significant security risks. SMEs need to ensure that mobile devices used for work purposes are properly secured, especially if employees are working remotely or using personal devices for work tasks.

10 Cybersecurity Best Practices Every SME Should Implement

Action Steps:

  • Implement Mobile Device Management (MDM): Use an MDM solution to enforce security policies on all mobile devices used within the organisation. This includes requiring password protection, encrypting data, and enabling remote wipe functionality.
  • Restrict Access to Sensitive Data: Ensure that sensitive data can only be accessed through secure channels, such as VPNs or dedicated apps, rather than via unsecured mobile browsers or public Wi-Fi networks.
  • Monitor for Unauthorised Apps: Regularly review the apps installed on work devices to ensure that no unauthorised or potentially malicious software is present. Encourage employees to only download apps from trusted sources.

The risks associated with mobile devices are particularly high due to the ease with which they can be lost or stolen. By implementing strong security policies, SMEs can mitigate these risks and ensure that mobile devices remain a secure extension of their IT infrastructure.

9. Control Access to Data

Not every employee needs access to every piece of company data. By limiting access based on roles and responsibilities, you can minimise the risk of insider threats and reduce the likelihood of accidental data breaches. This principle, known as the principle of least privilege (PoLP), ensures that employees can only access the information necessary to perform their jobs.

10 Cybersecurity Best Practices Every SME Should Implement

Action Steps:

  • Implement Role-Based Access Controls (RBAC): Use RBAC to restrict access to sensitive data based on job function. For example, only finance personnel should have access to financial records, and only HR should have access to employee information.
  • Monitor Access Logs: Regularly review access logs to track who is accessing sensitive data and when. This can help you detect unusual or unauthorised access attempts and act quickly to mitigate potential risks.
  • Review and Update Permissions Regularly: Conduct regular audits of employee access privileges to ensure that permissions are still relevant. As employees change roles or leave the company, their access to sensitive data should be adjusted accordingly.

In addition to RBAC, SMEs can benefit from using multifactor authentication (MFA) to secure access to sensitive data. This ensures that even if login credentials are compromised, additional verification is required before data can be accessed.

10. Monitor and Audit Systems Regularly

A strong cybersecurity posture isn’t something you achieve once—it requires continuous monitoring and regular auditing. Proactively monitoring your systems for suspicious activity helps you detect potential threats before they cause significant damage. Regular audits, meanwhile, allow you to assess the effectiveness of your security controls and identify areas for improvement.

Action Steps:

  • Set Up Automated Monitoring Tools: Use automated tools to monitor network traffic, detect unusual behaviour, and flag potential threats in real-time. This could include everything from monitoring login attempts to tracking changes in file integrity.
  • Conduct Regular Cybersecurity Audits: Schedule periodic audits of your entire IT infrastructure to assess your security defences. These audits should evaluate whether your firewalls, encryption protocols and other controls are up to date and functioning as intended.
  • Review Audit Logs: Keep detailed audit logs of all significant system events, including access to sensitive data, configuration changes, and software updates. These logs provide valuable information in the event of a breach and can help you identify exactly what went wrong.

By combining continuous monitoring with regular audits, SMEs can stay one step ahead of cyber threats. Rather than reacting to attacks after they occur, proactive monitoring allows businesses to identify and mitigate risks before they cause harm.

Implementing these 10 cybersecurity best practices is essential for protecting your SME against the ever-growing range of cyber threats. From employee training and strong password policies to encryption and incident response planning, these steps will go a long way in ensuring the security of your business data and systems.

While no security system is foolproof, taking proactive measures can drastically reduce your vulnerability to cyberattacks. By fostering a culture of cybersecurity and staying vigilant, you can minimise risks and focus on what matters most: growing your business.

Need Help?

If you don’t know about a threat, you cannot act. SOS Intelligence can be your eyes and ears on the dark web, providing digital risk monitoring to make sure you have the right intelligence, when you need it, to take action to protect your business.

Photos by Andrea De Santis, Ofspace LLC, rc.xyz NFT gallery, Fusion Medical Animation, Photo by Luke Chesser, William Hook, Connor Williams, Samsung Memory, ThisisEngineering on Unsplash.

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 16 September 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2023-4357

Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)

https://nvd.nist.gov/vuln/detail/CVE-2023-4357

 


 

2. CVE-2024-7965

Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

https://nvd.nist.gov/vuln/detail/CVE-2024-7965

 


 

3. CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


 

4. CVE-2024-21060

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2024-21060

 


 

5. CVE-2024-38063

Windows TCP/IP Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38063

 


 

6. CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

https://nvd.nist.gov/vuln/detail/CVE-2022-22965

 


 

7. CVE-2021-44228

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

https://nvd.nist.gov/vuln/detail/CVE-2021-44228

 


 

8. CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH’s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

https://nvd.nist.gov/vuln/detail/CVE-2024-6387

 


 

9. CVE-2021-42278

Active Directory Domain Services Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2021-42278

 


 

10. CVE-2024-30051

Windows DWM Core Library Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-30051

 


"Top
Opinion, SME Cybersecurity

Top 5 Cyber Threats Every SME Should Be Aware Of

In today’s fast-paced digital age, businesses are more connected than ever before. While this connectivity has created countless growth opportunities, it has also introduced new vulnerabilities. Cyber threats have evolved in sophistication, making them a critical concern for businesses of all sizes.

Small and medium-sized enterprises (SMEs) are particularly attractive targets for cybercriminals. Unlike larger corporations, which often have dedicated security teams and robust defences in place, SMEs frequently lack the resources to protect themselves adequately. This perception of vulnerability makes them an enticing target for attackers.

According to the Federation of Small Businesses (FSB), cybercrime costs the UK economy around £4.5 billion annually, with the average cost of an attack on a small business estimated to be around £1,300 per victim. For an SME, a cyberattack can lead to not only significant financial losses but also loss of customer trust, reputational damage, and even the risk of going out of business.

As a business owner, it’s essential to be aware of the common types of cyber threats and how to protect your business. In this blog, we’ll explore the top five cyber threats facing SMEs, share real-world examples of businesses that have been impacted, and provide actionable tips on how to identify and prevent these attacks.

1. Phishing Attacks

What is Phishing?

Phishing is a form of social engineering that involves cybercriminals pretending to be trusted entities to trick individuals into revealing sensitive information such as passwords, bank details, or personal data. These attacks are most commonly conducted via email but can also occur through text messages (smishing) or phone calls (vishing).  When such attacks are targeted at a specific person within a company, often someone in a senior or sensitive role, they are referred to as spear phishing.

Phishing emails often contain malicious links or attachments. When an unsuspecting employee clicks on a link or downloads an attachment, they might inadvertently provide access to sensitive company data or install malware on their device.

Real-Life Example: The WADA Attack

In 2016, the World Anti-Doping Agency (WADA) became the target of a sophisticated phishing attack. Hackers posed as WADA officials and tricked employees into revealing login credentials. These credentials were then used to access confidential athlete information, which was subsequently leaked. The damage caused by this breach not only harmed WADA’s reputation but also disrupted trust in global anti-doping efforts.

How to Identify Phishing:

  • Suspicious Email Addresses: Phishing emails may appear to come from legitimate sources, but a close inspection of the sender’s email address often reveals small inconsistencies, such as an extra character or unusual domain name.
  • Urgency and Fear Tactics: Many phishing emails create a sense of urgency or fear. For example, they may claim your account will be suspended unless you take immediate action.
  • Unexpected Attachments or Links: Phishing emails may ask recipients to open attachments or click on links. Always hover over links to verify their destination before clicking.

How to Protect Your SME:

  • Implement Two-Factor Authentication (2FA): 2FA adds an extra layer of security by requiring users to provide two forms of identification before accessing accounts. This reduces the risk of compromised passwords.
  • Ongoing Employee Training: Regularly educate your employees about the risks of phishing. Make sure they know how to identify suspicious emails and what to do if they receive one.
  • Advanced Email Security: Use email filtering tools that block or flag suspicious messages before they reach your employees’ inboxes.

2. Ransomware

What is Ransomware?

Ransomware is a type of malicious software that locks or encrypts a victim’s data, rendering it inaccessible until a ransom is paid. Cybercriminals typically demand payment in cryptocurrencies, which are harder to trace, and often provide a tight deadline for payment to pressure victims.

For SMEs, ransomware can be devastating. In addition to the ransom itself, businesses can face operational downtime, loss of sensitive data, and a hit to their reputation. Moreover, there is no guarantee that paying the ransom will lead to the recovery of your data.

In recent years, the majority of ransomware threat actors have moved to a double extortion method, whereby not only do they encrypt your data, but they also threaten to release it to the public through their victim-shaming blogs.  We are now also beginning to see instances where threat actors rely solely on this threat of data publication, rather than data encryption.

Real-Life Example: The WannaCry Attack

In 2017, the WannaCry ransomware attack swept across the globe, affecting more than 200,000 computers in over 150 countries. One of the most notable victims was the NHS in the UK, which faced widespread disruption as critical medical systems became inoperable. WannaCry exploited a vulnerability in older versions of Microsoft Windows, and while a patch had been released, many organisations had not yet applied it.

The total financial impact of WannaCry was estimated to be in the billions, with businesses around the world incurring significant downtime and recovery costs.

How to Identify a Ransomware Attack:

  • Files Become Inaccessible: One of the most obvious signs of a ransomware attack is that you are suddenly unable to access your files or data.
  • Ransom Note: Ransomware attacks often display a message explaining that your files have been encrypted and demanding payment for their release.
  • Unusual Network Activity: You may notice strange spikes in network traffic as ransomware spreads through your system, attempting to encrypt all connected devices.

How to Protect Your SME:

  • Backup Critical Data: Regularly back up your data and ensure that backups are stored offline or in a secure cloud service. This way, if a ransomware attack occurs, you can restore your data without paying the ransom.
  • Patch and Update Software: Ensure all systems and software are up-to-date. Many ransomware attacks exploit known vulnerabilities that can be patched through regular updates.
  • Endpoint Security Solutions: Install advanced antivirus and anti-malware software that can detect and block ransomware before it causes damage.

3. Malware

What is Malware?

Malware is an umbrella term used to describe any malicious software designed to disrupt, damage, or gain unauthorised access to a computer system. Types of malware include viruses, worms, trojans, spyware, and adware.

Once malware infiltrates a system, it can steal data, monitor user activity, install additional harmful software, or even render systems inoperable. For SMEs, a malware attack can result in lost productivity, compromised customer data, and long-term damage to your brand’s reputation.

Real-Life Example: The NotPetya Attack

NotPetya was initially thought to be ransomware, but its true intent was far more destructive. In June 2017, the malware spread across organisations globally, severely impacting businesses like shipping giant Maersk, which faced significant operational downtime and financial losses as its systems were brought to a halt. The attack encrypted critical files and disrupted supply chains, costing Maersk an estimated £300 million.

NotPetya also highlights another significant cyber-security concern: supply-chain attacks.  The malware had originated from the Ukrainian company Intellect Service, which supplied tax software.  Threat actors breached the company and configured their software updater to download the malware to anyone using the software, which occurred when the latest software update was pushed.  This highlights the need to properly consider not only your risk but third-party risk as well.

How to Identify Malware:

  • Sluggish Performance: If your computers or network are unusually slow, this could be a sign that malware is consuming system resources.
  • Pop-Up Ads: Malware infections are often accompanied by a barrage of unwanted pop-up ads, even when you’re not browsing the web.
  • System Crashes: Frequent crashes or the appearance of the “blue screen of death” could indicate that your system has been compromised.

How to Protect Your SME:

  • Install and Update Antivirus Software: Ensure that all company devices are equipped with up-to-date antivirus software. Schedule regular scans to identify and remove malware.
  • Limit Software Downloads: Only allow trusted employees to install or download software to prevent the introduction of malware from suspicious sources.
  • Monitor Network Traffic: Keep an eye on your network for unusual spikes in data usage, which could be a sign of malware communicating with external servers.

4. Insider Threats

What are Insider Threats?

Insider threats come from within your organisation and are caused by employees, contractors, or anyone with legitimate access to your systems. These individuals can either intentionally or unintentionally compromise your data and security. Insider threats can be difficult to detect because they exploit trusted access.

Real-Life Example: Tesla’s Insider Sabotage

In 2018, Tesla faced an insider threat when a disgruntled employee deliberately sabotaged the company’s systems. The employee altered the company’s manufacturing operating system and leaked confidential data to third parties. Tesla’s CEO, Elon Musk, publicly confirmed the damage caused by the incident, which affected the company’s operations and intellectual property.

How to Identify Insider Threats:

  • Unusual Access Patterns: If an employee is accessing files or systems they don’t usually use, this could be a sign of an insider threat.
  • Data Downloads: Sudden spikes in data downloads, especially involving sensitive information, can indicate malicious activity.
  • Employee Behaviour: Employees exhibiting signs of dissatisfaction or frustration could potentially become insider threats.

How to Protect Your SME:

  • Role-Based Access Control (RBAC): Limit access to data based on an employee’s role and responsibilities. Employees should only have access to the information necessary for their job.
  • Regular Audits: Conduct routine audits of system access and file downloads. This can help identify unusual patterns of behaviour that may indicate an insider threat.
  • Encourage Employee Reporting: Create a culture where employees feel comfortable reporting suspicious behaviour, without fear of retribution.

5. Distributed Denial of Service (DDoS) Attacks

What is a DDoS Attack?

A Distributed Denial of Service (DDoS) attack occurs when multiple compromised systems flood a target, such as a website or online service, with an overwhelming amount of traffic. The sheer volume of requests causes the target to become slow, unresponsive, or even crash altogether.

While DDoS attacks don’t typically result in data theft, they can cause significant operational disruptions. For SMEs that rely on online services, even a temporary outage can lead to lost revenue, frustrated customers, and long-term reputational damage.

Real-Life Example: The Dyn DNS Attack

In 2016, Dyn, a major provider of DNS services, was hit by a massive DDoS attack that affected major websites such as Twitter, Spotify, and Netflix. The attack, which was conducted using a botnet made up of Internet of Things (IoT) devices, disrupted services for several hours, highlighting the vulnerability of DNS infrastructure and the far-reaching impact of DDoS attacks.

How to Identify a DDoS Attack:

  • Slow or Unresponsive Website: If your website becomes unusually slow or users report difficulty accessing it, this could be the result of a DDoS attack.
  • Spike in Traffic: A sudden and unexpected increase in traffic, especially if it comes from unknown or foreign sources, is a common indicator of a DDoS attack.
  • Service Outages: Repeated service interruptions or crashes can point to a sustained DDoS assault.

How to Protect Your SME:

  • Use a CDN: Content Delivery Networks (CDNs) distribute traffic across multiple servers, reducing the impact of DDoS attacks by ensuring that no single server is overwhelmed.
  • Invest in DDoS Mitigation Services: There are dedicated DDoS mitigation tools and services that can detect abnormal traffic patterns and block malicious requests before they reach your network.
  • Firewalls and Load Balancers: Use Web Application Firewalls (WAFs) and load balancers to filter incoming traffic, block malicious IP addresses, and distribute the load more effectively across servers.

Conclusion: Building a Resilient Cybersecurity Strategy

The risks of cyberattacks are real, and for SMEs, the consequences can be especially severe. By understanding the top cyber threats—phishing, ransomware, malware, insider threats, and DDoS attacks—business owners can take proactive steps to secure their operations.

Cybersecurity is not just a technical issue but a fundamental part of business resilience. Implementing strong security measures, providing ongoing employee training, and fostering a culture of cybersecurity awareness will go a long way in reducing the risk of cyberattacks.

Ultimately, it’s not about if your business will be targeted but when. Taking the time to assess your vulnerabilities and enhance your security protocols now will save you time, money, and reputation in the long run. The best time to protect your business is today.

Read our first post in this series here > What every SME needs to know.

Need Help?

If you don’t know about a threat, you cannot act. SOS Intelligence can be your eyes and ears on the dark web, providing digital risk monitoring to make sure you have the right intelligence, when you need it, to take action to protect your business. Click here to book a demo.

Photos by FlyD , Stephen Phillips – Hostreviews.co.uk, Michael Geiger on Unsplash.

"Voldemort
SOS Intelligence Weekly News Round Up

Weekly News Roundup

02 – 08 September 2024

CVE Discussion

Over the past week, we’ve monitored our vast collection of new data to identify discussions of CVEs. 

Ransomware Top 5s

News Roundup

New Malware Exploits Google Sheets for Data Theft and Control

In August 2024, cybersecurity researchers at Proofpoint discovered a novel malware campaign, nicknamed “Voldemort,” that exploits Google Sheets for storing and transmitting stolen data. This backdoor malware takes advantage of Google Sheets’ trusted status to mask its malicious activities, including issuing commands and exfiltrating data. The threat actor also used various common techniques, such as cobalt strike payloads and Windows LNK files, to deploy additional malicious scripts, particularly targeting systems using the C programming language.

The attack began intensifying on 5 August 2024, affecting over 70 organisations with more than 20,000 malicious messages. Users were redirected to malicious URLs and download pages, where files disguised as PDFs would activate the malware. Once deployed, Voldemort would gather system information and download additional malware from Google Sheets, further spreading within the compromised network. The malware’s sophisticated use of Google’s APIs allowed it to covertly interact with infected machines, creating unique pages within Google Sheets for each victim, which stored stolen data.

Researchers noted that while the malware’s impact was significant, many of the infections occurred within sandbox environments or were targeted at security researchers. Despite this, the actor behind Voldemort remains unidentified, though they are suspected to be an Advanced Persistent Threat (APT) group focused on intelligence gathering. The use of Google Sheets for command and control highlights the increasing complexity of cyberattacks, as cybercriminals find new ways to exploit trusted platforms to bypass detection.

Hacktivist Group Head Mare Exploits WinRAR Vulnerability in Targeted Cyber Attacks

The hacktivist group “Head Mare” has been exploiting a vulnerability in WinRAR, a popular file compression utility, to launch attacks on both Windows and Linux systems. Known as CVE-2023-38831, this flaw allows the group to execute arbitrary code through malicious archive files, enabling them to infiltrate systems and encrypt files. Active since the Russo-Ukrainian conflict, Head Mare primarily targets organizations in Russia and Belarus, aiming to cause significant disruption through sophisticated malware and ransomware attacks.

Head Mare’s toolkit includes a mix of widely available software and custom-developed malware, such as LockBit and Babuk ransomware for encryption, and PhantomDL and PhantomCore for system access and exploitation. Their methods involve phishing campaigns that distribute malicious archives, exploiting the WinRAR vulnerability to gain initial access. Once inside, the group maintains persistence by modifying the Windows registry and creating scheduled tasks. They also demand ransoms for data decryption, adding a financial motive to their politically driven attacks.

The group’s infrastructure is highly advanced, using VPS servers and tools like ngrok for network pivoting and command-and-control (C2) communication. Head Mare employs various evasion techniques, including obfuscating their malware and disguising it as legitimate software. Their activities, which exploit the CVE-2023-38831 vulnerability, emphasise the growing complexity of cyber threats linked to geopolitical conflicts. Organisations in affected regions are urged to patch vulnerabilities and strengthen defences against phishing attacks to mitigate these risks.

Electric Vehicle Owners Targeted by Quishing Attacks via Charging Stations

Electric vehicle (EV) owners are being warned about the rise of “quishing” attacks at charging stations. These attacks involve cybercriminals using fraudulent QR codes to deceive drivers into visiting malicious websites or providing sensitive information. As QR codes become increasingly common for payment and activation at public charging stations, scammers exploit this trust by placing fake QR code stickers over legitimate ones. When unsuspecting users scan these codes, they are redirected to fake payment portals, where their personal data or payment details may be stolen.

The consequences of these attacks can be severe, including financial losses and the installation of malware on users’ devices. Cybersecurity experts warn that as vehicles become more connected, quishing attacks may also evolve to target cars themselves. To protect against these scams, EV owners are advised to inspect charging stations for tampering, use official charging apps, avoid entering payment information on unfamiliar websites, and keep their devices up to date with the latest security software.

Charging station operators are responding to the threat by enhancing security measures, such as using tamper-evident QR codes and increasing inspections. Experts stress the importance of staying informed about these emerging threats, as the expanding EV market presents new opportunities for cybercriminals. With awareness and caution, drivers can enjoy the benefits of electric mobility while protecting themselves from evolving scams like quishing.

Cisco Meraki Systems Manager for Windows Vulnerability Allows Privilege Escalation

Cisco has issued a critical security advisory regarding a vulnerability in the Cisco Meraki Systems Manager (SM) Agent for Windows, identified as CVE-2024-20430. This flaw allows authenticated local attackers to execute arbitrary code with elevated privileges, potentially gaining SYSTEM-level access. With a CVSS score of 7.3, this high-severity vulnerability presents a significant risk to affected systems and requires immediate action. The vulnerability stems from improper handling of directory search paths at runtime, enabling attackers to exploit the system by placing malicious configuration and DLL files.

There are no workarounds for this vulnerability, but Cisco has released software updates that address the issue. Users are strongly advised to upgrade to Cisco Meraki SM Agent for Windows Release 4.2.0 or later. The Cisco Meraki SM Agent for Mac is not affected. Customers can download the updates through the Meraki Dashboard, provided they have a valid license. Systems configured to automatically update will receive the patch to mitigate the risk.

While there have been no reported public exploitations of the vulnerability, Cisco urges users to stay vigilant by consulting the Cisco Security Advisories page for updates and ensuring that their systems are running the latest software versions. Cisco’s proactive approach in addressing this issue underscores the importance of maintaining strong security practices to safeguard against emerging cyber threats.

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 09 September 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2023-4357

Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)

https://nvd.nist.gov/vuln/detail/CVE-2023-4357

 


 

2. CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


 

3. CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

https://nvd.nist.gov/vuln/detail/CVE-2022-22965

 


 

4. CVE-2024-21060

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2024-21060

 


 

5. CVE-2024-7965

Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

https://nvd.nist.gov/vuln/detail/CVE-2024-7965

 


 

6. CVE-2021-44228

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

https://nvd.nist.gov/vuln/detail/CVE-2021-44228

 


 

7. CVE-2021-42278

Active Directory Domain Services Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2021-42278

 


 

8. CVE-2022-22947

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

https://nvd.nist.gov/vuln/detail/CVE-2022-22947

 


 

9. CVE-2021-31805

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{…} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

https://nvd.nist.gov/vuln/detail/CVE-2021-31805

 


 

10. CVE-2024-20017

In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.

https://nvd.nist.gov/vuln/detail/CVE-2024-20017

 


"Inside
Opinion, SME Cybersecurity, Tips

Inside a Cyber Attack – Key Phases and Business Impact

The Far-Reaching Impact of Cyber Attacks and what are the phases?

In an era where digital connectivity underpins nearly every aspect of our personal and professional lives, the threat of cyber attacks is not going away. As you can probably imagine, it’s getting worse.

From personal data breaches to corporate espionage and national security threats, cyber attacks can have profound and far-reaching consequences. In this blog post, we’ll explore the various impacts of cyber attacks, including economic damage, operational disruption, reputational harm, and personal consequences. We will also outline the main phases of an attack.

One of the areas we try and focus on is providing as much education as possible for businesses and organisations. Here is an infographic we have recently developed which outlines the main phases inside a cyber attack.

You will see that the phases are distinct and each one has certain things which happen which then leads to the next phase. The critical part to understand is that if you have insight into a leak of credentials or a discussion of a vulnerability, you can take action and stop this chain of events.

You can download the PDF version here. (Opens in a new tab for you).

The key phases flow from one to another, often with alarming speed. If you don’t know what has happened or indeed, happening, you cannot act…

This is where SOS Intelligence comes in to give you the insight and information you need for your business or organisation.

So what is the business impact from a cyber attack?


Economic Damage: The Price of Vulnerability

One of the most immediate and tangible impacts of a cyber attack is its financial cost. Businesses and organisations may face:

  • Direct Financial Losses: This includes the immediate costs of response and remediation, such as hiring cybersecurity experts, paying for system repairs, and dealing with potential legal fees. Financial losses can soar into the millions of pounds.
  • Ransom Payments: In ransomware attacks, cybercriminals encrypt data and demand payment for its release. These payments can be substantial, and even if the ransom is paid, there’s no guarantee that the data will be recovered or that the organization won’t be targeted again.
  • Insurance Costs: Many organisations turn to cyber insurance to mitigate potential losses, but premiums can rise significantly after an attack, adding to the long-term financial burden.

Operational Disruption: Halting Business As Usual

Cyber attacks can cripple a businesses’ ability to operate effectively. The impact on operations can be severe:

  • Downtime: System outages or disruptions can halt business operations, affecting productivity and revenue. For some organisations, it can be critical infrastructure which is disrupted. For the recent NHS attacks in the UK, operations and appointments as well as medical testing were severely disrupted.
  • Data Loss: Losing access to critical data can impede decision-making processes, delay projects, and affect customer service. Restoring lost data can be time-consuming and costly.
  • Supply Chain Disruptions: Cyber attacks can ripple through supply chains, causing delays and impacting partners and customers. The 2020 SolarWinds attack, which compromised numerous organizations through a single software provider, is a prime example of how interconnected systems can be affected. SOS Intelligence can help you monitor your third parties as well as your own domains and keywords.

Reputational Harm: Eroding Trust

The damage to an organisation’s reputation can be long-lasting and challenging to repair:

  • Customer Trust: Data breaches that expose personal information can erode customer trust. Customers expect companies, large and small, to safeguard their data, and a breach can lead to loss of business and diminished customer loyalty. This would be especially so in the legal sector which is seeing a rise in cyber threats.
  • Public Perception: How an organisation responds to an attack can influence public perception. A poorly managed response can exacerbate reputational damage, while transparent and effective communication can help rebuild trust. Ideally, you don’t want to be ion this position in the first place!
  • Competitive Disadvantage: Competitors may capitalise on an organisation’s misfortune, attracting clients who are concerned about security. Additionally, the affected business may face increased scrutiny from regulators and stakeholders.

Personal Consequences: The Human Element

The impact of cyber attacks extends beyond businesses and can significantly affect individuals as well:

  • Identity Theft: Personal data breaches can lead to identity theft, where sensitive information is used fraudulently, potentially causing long-term financial and emotional distress for victims.
  • Privacy Invasion: Cyber attacks that expose private communications or personal data can lead to privacy violations, harassment, and psychological distress.
  • Loss of Confidence: Individuals who fall victim to cyber attacks may experience a loss of confidence in digital systems, leading to increased anxiety and reluctance to use online services.

The Path Forward: Enhancing Cyber Resilience

In light of these impacts, it’s crucial for businesses, organisations and individuals to improve their cyber defences AND adopt best practices to mitigate risks:

  • Invest in Cybersecurity: Regularly update and upgrade cybersecurity measures, including firewalls, anti-virus software, and encryption. If you have not seen what SOS Intelligence can do for you, please get in touch, we would be delighted to show you.
  • Educate and Train: Ensure that employees and individuals are aware of potential threats and know how to recognise phishing attempts and other cyber risks.
  • Develop Response Plans: Have a robust incident response plan in place to quickly address and mitigate the effects of a cyber attack.
  • Regular Backups: Maintain regular backups of critical data to ensure recovery in the event of data loss.

Conclusion

Cyber attacks are a pervasive and evolving threat with significant consequences. The economic impact, operational disruption, reputational damage, and personal consequences underscore the importance of proactive measures to enhance your cyber resilience.

EVERY business and organisation is at risk, in any country and in any vertical. It is not just large organisations… SMEs are just as much at risk, and often at more risk as they don’t have large teams and systems in place.

If you’d like to book a demo of what SOS Intelligence can do for you, click here now.

Read the next blog post in our SME Cyberecurity series.

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 02 September 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2024-38112

Windows MSHTML Platform Spoofing Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38112

 


 

2. CVE-2024-38021

Microsoft Outlook Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38021

 


 

3. CVE-2024-38074

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38074

 


 

4. CVE-2024-38052

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38052

 


 

5. CVE-2024-38140

Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38140

 


 

6. CVE-2024-38199

Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38199

 


 

7. CVE-2024-38080

Windows Hyper-V Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38080

 


 

8. CVE-2024-38125

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38125

 


 

9. CVE-2024-38141

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38141

 


 

10. CVE-2024-38147

Microsoft DWM Core Library Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38147

 


"SOS
SOS Intelligence Weekly News Round Up

Weekly News Round Up

19 – 25 August 2024

CVE Discussion

Over the past week, we’ve monitored our vast collection of new data to identify discussions of CVEs. 

Ransomware Top 5s

News Roundup

Emergence of New Stealer Malware: QWERTY & Styx

A new strain of malware, named “QWERTY Info Stealer,” has been identified as a significant threat to Windows systems, utilising advanced anti-debugging techniques and data exfiltration capabilities. Hosted on the domain mailservicess[.]com, the malware is designed to evade detection, making it particularly dangerous for both individuals and organisations. Discovered on a Linux-based server in Frankfurt, Germany, the malware is distributed via the URL hxxps://mailservicess[.]com/res/data/i.exe.

QWERTY Info Stealer employs multiple anti-debugging strategies, such as using Windows API functions like IsProcessorFeaturePresent() and IsDebuggerPresent(), and the lesser-known __CheckForDebuggerJustMyCode function. These techniques enable the malware to terminate if it detects a debugging environment, complicating efforts by security researchers to analyse its behaviour. After bypassing these checks, the malware begins collecting data, including system information and browser data, which it stores in specific directories on the infected system. It then communicates with Command and Control (C2) servers, downloading additional payloads and exfiltrating data using HTTP POST requests, underlining its sophistication and the ongoing threat it poses to cybersecurity.

Cybersecurity researchers at Check Point have uncovered a new malware strain called “Styx Stealer,” designed to steal browser and instant messenger data. Emerging in April 2024 and based on the Phemedrone Stealer, Styx Stealer enhances its predecessor’s capabilities with features like crypto-clipping, real-time clipboard monitoring, and auto-start functionality. It targets Chromium and Gecko-based browsers to extract sensitive information such as passwords, cookies, and cryptocurrency wallet data, while also compromising Telegram and Discord sessions. The malware resists analysis by antivirus programs and sandboxes, making it a formidable tool for cybercriminals.

Styx Stealer was developed by a Turkish hacker known as “Sty1x,” who marketed it via Telegram, charging between $75 per month and $350 for unlimited access. An operational security lapse exposed his identity and connections with a Nigerian cybercriminal linked to an Agent Tesla campaign. This revelation highlighted the broader network of cybercriminals involved in various illicit activities, including targeting Chinese firms. Despite Sty1x’s efforts, there are no confirmed victims beyond their own systems and a few security sandboxes, suggesting that their attempts to widely distribute Styx Stealer were largely unsuccessful.

New Phishing Attack Targets Android & iOS Users

A new phishing attack targeting both Android and iOS users has been discovered, combining traditional social engineering techniques with the use of Progressive Web Applications (PWAs) and WebAPKs. First identified in November 2023, the attack primarily targets clients of Czech banks, though cases have also been reported in Hungary and Georgia, indicating a wider spread. The attackers employ various delivery methods, such as automated voice calls, SMS messages, and social media ads, which often use official bank mascots and logos to lure victims to a phishing link mimicking a Google Play page. If accessed via a mobile device, the page prompts the installation of a phishing app disguised as a legitimate banking application.

This phishing app, installed as a PWA or WebAPK, is almost indistinguishable from the real banking app, leading victims to a fake login page that captures their banking credentials. The stolen information is then transmitted to the attackers’ Command and Control (C&C) servers, which are operated by two distinct groups—one using a Telegram bot for real-time logging, and the other using a traditional C&C server. The attackers have managed to evade detection by frequently changing domains and launching new campaigns. To mitigate the risk, users should be cautious when installing apps, verify the authenticity of downloads, and keep their devices updated with the latest security patches.

Linux Kernel Vulnerability

Researchers have identified a vulnerability in the Linux kernel’s dmam_free_coherent() function, caused by a race condition during the process of freeing DMA (Direct Memory Access) allocations and managing associated resources. This flaw can lead to system instabilities, as DMA is essential for allowing hardware devices to transfer data directly to and from system memory without CPU involvement. The vulnerability arises from an improper order of operations within the function, which could result in incorrect memory access, data corruption, or system crashes.

The vulnerability is particularly concerning because an attacker could exploit the race condition by timing their operations to coincide with the freeing and reallocation of DMA memory. If successful, this could cause the devres_destroy function to free the wrong memory entry, triggering a WARN_ON assertion in the dmam_match function, which is part of the DMA management subsystem. This issue occurs when a concurrent task allocates memory with the same virtual address before the original entry is removed from the tracking list, potentially leading to significant system errors.

To address this vulnerability, Greg Kroah-Hartman committed a patch (CVE-2024-43856) authored by Lance Richardson from Google, which modifies the dmam_free_coherent function. The patch swaps the order of the function calls, ensuring that the tracking data structure is destroyed before the DMA allocation is freed, thereby preventing the race condition. The patch has been tested on Google’s internal network encryption project and has been approved for inclusion in the mainline Linux kernel, mitigating the risk associated with this vulnerability. Exploiting this vulnerability to achieve arbitrary code execution would be complex and would likely require additional vulnerabilities or precise control over the target system.

Zero-day Vulnerability in Google Chrome

Google recently patched a high-severity zero-day vulnerability in its Chrome browser, CVE-2024-7971. This flaw, found in the V8 JavaScript engine, is a type confusion issue that can be exploited to execute arbitrary code. The vulnerability was reported by the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) on August 19, 2024, and it is actively being exploited in the wild. In response, Google quickly released updates to mitigate the risk, urging users to update their browsers to the latest version.

The latest Chrome update, version 128.0.6613.84/.85, addresses a total of 38 security vulnerabilities, including several high-severity issues. Among these are CVE-2024-7964, a use-after-free vulnerability in the Passwords component; CVE-2024-7965, an inappropriate implementation in the V8 engine; and CVE-2024-7966, an out-of-bounds memory access flaw in the Skia graphics library. Each of these vulnerabilities could allow attackers to execute arbitrary code, leading to serious security breaches or system compromises.

Users are strongly advised to update to the latest version of Google Chrome to ensure protection against these vulnerabilities. While Chrome generally updates automatically, users can manually check for updates via Settings > About Chrome. Additionally, those using Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi should also apply the latest security updates as they become available. This patch highlights the need for vigilance and prompt action in the face of zero-day exploits in widely used software.

Chinese Hackers Exploiting Cisco Zero-day

A sophisticated cyber espionage group known as Velvet Ant, linked to China, has been found exploiting a zero-day vulnerability in Cisco NX-OS Software to deploy custom malware on network switches. The vulnerability, identified as CVE-2024-20399, was discovered by cybersecurity firm Sygnia during a forensic investigation and promptly reported to Cisco. This flaw, with a CVSS score of 6.0, allows an authenticated local attacker with administrative privileges to execute arbitrary commands as root on the affected devices due to insufficient validation of arguments passed to specific CLI commands.

Velvet Ant exploited this vulnerability to install a custom malware, dubbed VELVETSHELL, on compromised Cisco Nexus devices. The malware, which combines elements of the TinyShell Unix backdoor and the 3proxy tool, enables attackers to execute arbitrary commands, upload and download files, and create tunnels to proxy network traffic. Sygnia’s investigation revealed that Velvet Ant has been operating for approximately three years, targeting inadequately protected network appliances like outdated F5 BIG-IP systems to maintain long-term access and steal sensitive information.

Cisco has released software updates to patch the vulnerability and strongly advises customers to apply these updates immediately. Experts warn that network appliances, especially switches, are often under-monitored, with logs rarely forwarded to centralized logging systems, making it difficult to detect and investigate such malicious activities. To mitigate this threat, organizations are urged to apply Cisco’s updates, enhance monitoring of network appliances, regularly update administrator credentials, and adopt stringent security practices to prevent unauthorized access.

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 26 August 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2023-45866

Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.

https://nvd.nist.gov/vuln/detail/CVE-2023-45866

 


 

2. CVE-2024-38112

Windows MSHTML Platform Spoofing Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38112

 


 

3. CVE-2024-38021

Microsoft Outlook Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38021

 


 

4. CVE-2024-38074

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38074

 


 

5. CVE-2024-38052

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38052

 


 

6. CVE-2024-38080

Windows Hyper-V Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38080

 


 

7. CVE-2024-38140

Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38140

 


 

8. CVE-2024-38199

Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38199

 


 

9. CVE-2022-44666

Windows Contacts Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2022-44666

 


 

10. CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


""/
SOS Intelligence Weekly News Round Up

Weekly News Round Up

12 – 18 August 2024

CVE Discussion

Over the past week, we’ve monitored our vast collection of new data to identify discussions of CVEs. 

Ransomware Top 5s

News Roundup

Hackers’ Toolkit Exposed

Cybersecurity researchers have uncovered an extensive hacker toolkit, revealing a sophisticated set of tools designed for various stages of cyberattacks. The toolkit, discovered in an open directory in December 2023, comprises a range of batch scripts and malware targeting both Windows and Linux systems. These tools illustrate the hackers’ ability to execute a variety of malicious activities, from initial system compromise to long-term control and data exfiltration.

Among the most significant tools found were PoshC2 and Sliver, two command and control (C2) frameworks commonly used by penetration testers but repurposed for malicious purposes. The toolkit also included custom scripts designed for defence evasion and system manipulation, such as those for removing remote management agents, deleting system backups, and erasing event logs. These components reflect the attackers’ intent to maintain persistent access while covering their tracks.

The discovery of this toolkit highlights the advanced methods used by modern cybercriminals and emphasises the need for robust cybersecurity measures. Experts recommend that organisations adopt comprehensive security strategies, including regular updates, employee training, and advanced threat detection, to protect against these sophisticated attacks. The presence of tools aimed at stopping services, deleting backups, and disabling antivirus software suggests that the toolkit was likely used in ransomware activities.

Critical Vulnerabilities in AWS Identified

Researchers from Aqua identified critical vulnerabilities in six Amazon Web Services (AWS) offerings: CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar. These vulnerabilities, varying in severity, posed significant risks such as remote code execution, service user takeover, AI module manipulation, data exposure, exfiltration, and denial of service (DoS) attacks, potentially affecting any organisation globally that utilised these services. Aqua introduced two key attack vectors, “Shadow Resource” and “Bucket Monopoly,” which exploit automatically generated AWS resources, like S3 buckets, created without explicit user commands. These techniques could allow attackers to execute code, steal data, or take over user accounts.

The vulnerabilities were reported to AWS between February and March 2024, with AWS confirming fixes for most by June 2024. However, a subsequent report indicated that the CloudFormation fix left users vulnerable to a DoS attack, prompting AWS to announce further work on this issue. By August 2024, the vulnerabilities and fixes were publicly discussed at prominent cybersecurity conferences, Black Hat USA and DEF CON 32. AWS’s response included adding random sequences to bucket names if a name conflict arose and planning the deprecation of CodeStar, which had been vulnerable but would no longer allow new projects.

One of the most critical vulnerabilities was in AWS Glue, where attackers could exploit predictable S3 bucket naming to inject malicious code into Glue jobs, leading to remote code execution. To mitigate these risks, it is recommended that organisations implement scoped policies, verify bucket ownership, and avoid using predictable bucket names. While AWS has addressed these specific vulnerabilities, similar risks may exist in other services, underscoring the importance of following best practices and implementing robust security measures to protect against evolving threats.

0-Click Vulnerability leading to RCE found in Outlook

Morphisec researchers have identified a critical vulnerability in Microsoft Outlook, labelled as CVE-2024-30103, which allows remote code execution when a malicious email is opened. This flaw builds on a previously discovered vulnerability, CVE-2024-21378, that exposed Outlook to remote code execution via synchronized form objects. The new vulnerability exploits weaknesses in the allow-listing mechanism, which fails to properly validate form server properties, enabling attackers to instantiate unauthorized custom forms.

The vulnerability hinges on how the Windows API function RegCreateKeyExA handles registry paths. Specifically, the function removes trailing backslashes, allowing attackers to manipulate registry keys and bypass security checks. This manipulation can lead to the loading of malicious executables when a specially crafted email is opened in Outlook. By exploiting this behaviour, attackers can execute arbitrary code within the Outlook process, potentially leading to data breaches, unauthorized access, and other malicious activities.

In response, Microsoft has issued a security update that revises the allow-listing matching algorithm to prevent such exploits. The update modifies how subkeys are matched by removing trailing backslashes before performing an exact match, enhancing system defences. Additionally, Microsoft has strengthened its denylist to block remote code execution attacks exploiting subkey manipulation. Despite these improvements, the evolving nature of security threats means organisations must remain vigilant, regularly updating and auditing their systems to protect against future vulnerabilities.

APT42 targeting US Presidential Election

The Iranian government-backed cyber group APT42 has launched a phishing campaign targeting high-profile individuals connected to the U.S. presidential election, according to Google’s Threat Analysis Group (TAG). This sophisticated threat actor, linked to Iran’s Islamic Revolutionary Guard Corps (IRGC), has been focusing on individuals affiliated with both the Biden and Trump campaigns. The campaign is part of APT42’s broader efforts to support Iran’s political and military objectives through cyber espionage, with a notable focus on the U.S. and Israel, which together represent 60% of the group’s known targets.

APT42 employs a range of tactics in its phishing campaigns, including the use of malware, phishing pages, and malicious redirects, often hosted on popular services like Google Drive and OneDrive. The group is known for creating fake domains that closely resemble legitimate organizations, a tactic called typosquatting, to deceive their targets. Their phishing emails, often designed to seem credible, encourage recipients to enter credentials on fake landing pages, with the capability to bypass multi-factor authentication, making them particularly dangerous.

In response to these activities, Google has taken measures to secure compromised accounts and issued warnings to targeted individuals. They have also reported the malicious activities to law enforcement and are working with authorities to mitigate the threat. As the U.S. presidential election nears, the actions of APT42 highlight the ongoing risk of foreign interference, emphasizing the need for robust cybersecurity measures to protect democratic processes. High-risk individuals are advised to enhance their security, including enrolling in Google’s Advanced Protection Program.

Phishing Campaign masquerading as Google Safety Center

A sophisticated phishing campaign has been identified, where cybercriminals impersonate the Google Safety Centre to trick users into downloading a malicious file disguised as the Google Authenticator app. This attack threatens personal data by installing two types of malware, Latrodectus and ACR Stealer, on victims’ devices. Latrodectus allows attackers to remotely control the infected device, while ACR Stealer uses advanced techniques to obscure its command and control server, making it difficult for cybersecurity experts to trace and neutralize the threat.

What makes this campaign particularly concerning is the attackers’ use of advanced evasion techniques, which indicate a high level of sophistication and ongoing refinement of their methods. As cybercriminals continue to evolve, cybersecurity experts urge users to be cautious when receiving unsolicited emails or messages, especially those prompting software downloads. Verifying the authenticity of such communications and keeping software and security systems up to date are crucial steps in protecting against these increasingly sophisticated threats.

Photo by Kenny Eliason on Unsplash

1 2 3 4 5 22 23
Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound