<?xml version="1.0"?>
<rss version="2.0"><channel><title>My Articles: My Articles</title><link>https://beta.jimiwikman.se/resources/my-articles/professional/698_ways-of-working/operations/?d=3</link><description>My Articles: My Articles</description><language>en</language><item><title>Criticial Ransomware Incident - Massive cyberattact through tech provider Kaseya</title><link>https://beta.jimiwikman.se/resources/my-articles/professional/698_ways-of-working/operations/criticial-ransomware-incident-massive-cyberattact-through-tech-provider-kaseya-r225/</link><description><![CDATA[
<p><img src="https://ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_07/Criticial-Ransomware-Incident---Massive-cyberattact-through-tech-provider-Kaseya.jpg.2fc3893a67f00feccd047f6c39a086c4.jpg" /></p>
<p>
	<strong>IT management software vendor <a href="https://beta.jimiwikman.se/companies/north-america/united-states-of-america/kaseya-r53/" rel="">Kaseya</a> whose VSA software platform is used by other tech companies to monitor and manage customers’ IT networks, has been the victim of an audacious cyberattack. On July 2, the business issued a security advisory urging its customers to immediately shut down versions of VSA running on their own servers. It also suspended its own cloud-based VSA service.</strong>
</p>

<p>
	Kaseya VSA is a remote management platform for MSPs that provides solutions such as automated patch management. According to Kaseya, the platform has been used by more than 36,000 MSP customers worldwide.
</p>

<p>
	"Beginning around mid-day (EST/US) on Friday, July 2, 2021, Kaseya's Incident Response team learned of a potential security incident involving our VSA software," the company's CEO Fred Voccola <a href="https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021" rel="external nofollow" target="_blank">said</a> in a statement shared late Friday.
</p>

<p>
	Kaseya's official recommendation is to:"IMMEDIATELY shutdown your VSA server until you receive further notice from us."
</p>

<blockquote class="ipsQuote" data-gramm="false" data-ipsquote="">
	<div class="ipsQuote_citation">
		Quote
	</div>

	<div class="ipsQuote_contents ipsClearfix" data-gramm="false">
		<p>
			We are experiencing a potential attack against the VSA that has been limited to a small number of on-premise customers only as of 2:00 PM EDT today. We are in the process of investigating the root cause of the incident with an abundance of caution but we recommend that you IMMEDIATELY shutdown your VSA server until you receive further notice from us. Its critical that you do this immediately, because one of the first things the attacker does is shutoff administrative access to the VSA.
		</p>
	</div>
</blockquote>

<p>
	This attack already has compromised eight of Kaseya's MSP customers with 200 businesses linked to three of the victims reporting instances of file encryption. <a href="https://reddit.com/r/msp/comments/ocggbv/crticial_ransomware_incident_in_progress/h3u5j2e/" rel="external nofollow" target="_blank">This Reddit post from huntresslabs</a> show the progress of sorting out how to fix this ransomeware attack.
</p>

<p>
	On Friday, <a href="https://twitter.com/markloman/status/1411035534554808331" rel="external nofollow" target="_blank">Mark Loman</a>, a malware analyst at security firm Sophos, tweeted the hackers demanded $5 million as ransom in exchange for the file decryptor. Image comes from <a href="https://thehackernews.com/2021/07/kaseya-revil-ransomware-attack.html" rel="external nofollow" target="_blank">thehackernews.com</a>.
</p>

<p>
	<a href="https://thehackernews.com/2021/07/kaseya-revil-ransomware-attack.html" rel="external nofollow" target="_blank"><img alt="Screenshot of the Kesaya Revil Ransomeware email." class="ipsImage ipsImage_thumbnailed" data-fileid="405" data-ratio="81.59" data-unique="sq2sq5sxm" style="width: 728px; height: auto;" width="728" data-src="//ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_07/REvil-ransomware.jpg.120f43c44ded294a11d6b33ffb3a4625.jpg" src="https://beta.jimiwikman.se/applications/core/interface/js/spacer.png"></a>
</p>

<p>
	<br>
	This seems to be quite nasty and here in Sweden it has affected one of our chain of groceries stores as they are unable to make payments due to this affecting their cashiers. In the US hundreds of companies have been affected and it is safe to assume that many companies in the EU and elsewhere might be affected as well.
</p>

<p>
	 
</p>
]]></description><guid isPermaLink="false">225</guid><pubDate>Sat, 03 Jul 2021 11:09:00 +0000</pubDate></item><item><title>Serious vulnerability in Windows Print Spooler "Print Nightmare"</title><link>https://beta.jimiwikman.se/resources/my-articles/professional/698_ways-of-working/operations/serious-vulnerability-in-windows-print-spooler-print-nightmare-r224/</link><description><![CDATA[
<p><img src="https://ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_07/Serious-vulnerability-in-Windows-Print-Spooler-Print-Nightmare.jpg.f40f2fc42844c9af87e70efd253f2327.jpg" /></p>
<p>
	<strong>If you have the "Print Spooler" service enabled (which is the default), it means that anyone with access can execute code as SYSTEM against the Windows domain controller. At present, there is no patch from Microsoft. So take a break from your vacation and turn off the service immediately. </strong>
</p>

<p>
	From <a href="https://www.tenable.com/blog/cve-2021-1675-proof-of-concept-leaked-for-critical-windows-print-spooler-vulnerability" rel="external nofollow">Tenable's blog</a>:
</p>

<blockquote class="ipsQuote" data-gramm="false" data-ipsquote="">
	<div class="ipsQuote_citation">
		Quote
	</div>
	<lt-highlighter contenteditable="false" data-gramm="false" style="display: none;"><lt-div class="lt-highlighter__wrapper" spellcheck="false" style="width: 0px !important; height: 0px !important; transform: none !important; transform-origin: 50% 50% 0px !important;"><lt-div class="lt-highlighter__scrollElement" style="top: 0px !important; left: 0px !important; width: 0px !important; height: 0px !important;"></lt-div></lt-div></lt-highlighter>

	<div class="ipsQuote_contents ipsClearfix" data-gramm="false" spellcheck="false">
		<p>
			Exploitation of CVE-2021-1675 could give remote attackers full control of vulnerable systems. To achieve RCE, attackers would need to target a user authenticated to the spooler service. Without authentication, the flaw could be exploited to elevate privileges, making this vulnerability a valuable link in an attack chain.
		</p>
	</div>
</blockquote>

<p>
	<video class="ipsEmbeddedVideo" controls="" data-fileid="404" data-unique="oq5uf3lbp" data-video-embed="" id="ips_uid_9809_7" src="https://ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_07/E5GOlYUXwAUyqzU.mp4.aad5bacd5d5fbc24215ac88d04c2dd0e.mp4">
		<source type="video/mp4" data-video-src="//ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_07/E5GOlYUXwAUyqzU.mp4.aad5bacd5d5fbc24215ac88d04c2dd0e.mp4"><a class="ipsAttachLink" data-fileext="mp4" data-fileid="404" href="https://beta.jimiwikman.se/applications/core/interface/file/attachment.php?id=404" rel="">E5GOlYUXwAUyqzU.mp4</a>
	</source></video>
</p>

<p>
	More information from Microsoft: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675" ipsnoembed="true" rel="external nofollow">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675</a>
</p>

<p>
	 
</p>
]]></description><guid isPermaLink="false">224</guid><pubDate>Sat, 03 Jul 2021 10:44:00 +0000</pubDate></item><item><title>Security flaw in Sudo - Heap-Based Buffer Overflow allow root access</title><link>https://beta.jimiwikman.se/resources/my-articles/professional/698_ways-of-working/operations/security-flaw-in-sudo-heap-based-buffer-overflow-allow-root-access-r208/</link><description><![CDATA[
<p><img src="https://ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_01/654289193_SecurityflawinSudo-Heap-BasedBufferOverflowallowrootaccess.jpg.da794cad58eb3c213afd03f8aeae16a0.jpg" /></p>
<p>
	<strong>A new security flaw has been identified in the sudo software. Sudo, which is installed by default in many operating systems, is by default setuid root. This means that any shortcomings can lead to local users being able to obtain root permissions. </strong>
</p>

<p>
	Over the years, sudo has also become larger and more features have been added. This has i.a. led to OpenBSD now having an option called doas.
</p>

<p>
	Yesterday, the <a href="https://beta.jimiwikman.se/companies/north-america/united-states-of-america/qualys-r30/" rel="">American security company Qualys</a> <a href="https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit" rel="external nofollow">reported that they had identified a vulnerability in sudo</a> (CVE-2021-3156). The vulnerability allows a local user to exploit a heap vulnerability and thus become rooted. The bug has been around since 2011 and is found in the standard configuration. It is important to point out that it is included in the standard configuration, as many vulnerabilities discovered in sudo require special configurations.
</p>

<p>
	The vulnerability is found in the set_cmnd () function and can be most easily triggered by using sudoedit and the following command:
</p>

<pre class="ipsCode" id="ips_uid_3141_10">
sudoedit -s '\' `perl -e 'print "A" x 65536'` </pre>

<p>
	And if you are vulnerable, you get a segfault. Please note that you need a local account but not a member of sudoers or similar. And that not all installations have sudoedit, such as macOS.
</p>

<p>
	Video from Qualys showing vulnerability:
</p>

<div class="ipsEmbeddedVideo" contenteditable="false">
	<div>
		<iframe allow="autoplay; fullscreen; picture-in-picture" allowfullscreen="" frameborder="0" height="480" src="https://player.vimeo.com/video/504872555?app_id=122963" title="CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)" width="640"></iframe>
	</div>
</div>

<p>
	 
</p>]]></description><guid isPermaLink="false">208</guid><pubDate>Sat, 30 Jan 2021 10:04:00 +0000</pubDate></item><item><title>Logokit Phishing Kit allow near instant websites using JavaScript</title><link>https://beta.jimiwikman.se/resources/my-articles/professional/698_ways-of-working/operations/logokit-phishing-kit-allow-near-instant-websites-using-javascript-r207/</link><description><![CDATA[
<p><img src="https://ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_01/1905037407_LogokitPhishingKitallownearinstantwebsitesusingJavaScript.jpg.635f822651ed8ebb4b49fb4fc2e85ed2.jpg" /></p>
<p>
	<strong>A new report from the <a href="https://beta.jimiwikman.se/companies/north-america/united-states-of-america/riskiq-r29/" rel="">security company RiskIQ</a> inform of a new phishing kit that use JavaScript to manipulate the DOM, which <span class="GenericText-sc-1xizqki-1 kzYunL" data-qa="genericText" value="RiskIQ is tracking a phishing kit aimed at simplicity of deployment and range of targeting. The overall phish kit, dubbed LogoKit, is designed to be fully modularized, allowing for easy reuse and adaptation by other threat actors. Unlike many other phishing kits that take advantage of complex layouts and multiple files, the LogoKit family is an embeddable set of JavaScript functions. These kits are designed to interact within the Document Object Model (DOM)--the site’s presentation layer. Interacting with the DOM allows for the script to dynamically alter the visible content and HTML form data within a page without user interaction.">allows for the script to dynamically alter the visible content and HTML form data within a page without user interaction.  This Phishing kit,  called LogoKit has seen a significant upswing in usage over the last month.</span></strong>
</p>

<p>
	Phishing has been on the rise lately, following the increased usage of data communication in the wake of COVID-19. This new phishing kit seem to have attracted attention lately due to its flexibility and very fast application compared to building websites manually  as is the common practice.
</p>

<blockquote class="ipsQuote" data-gramm="false" data-ipsquote="">
	<div class="ipsQuote_citation">
		Quote
	</div>
	<lt-highlighter contenteditable="false" data-gramm="false" style="display: none;"><lt-div class="lt-highlighter__wrapper" spellcheck="false" style="width: 0px !important; height: 0px !important; transform: none !important; transform-origin: 50% 50% 0px !important;"><lt-div class="lt-highlighter__scrollElement" style="top: 0px !important; left: 0px !important; width: 0px !important; height: 0px !important;"></lt-div></lt-div></lt-highlighter><div class="ipsQuote_contents ipsClearfix" data-gramm="false" spellcheck="false">
		<p>
			<em><span class="GenericText-sc-1xizqki-1 kzYunL" data-qa="genericText" value="In the case of LogoKit, a victim is sent a specially crafted URL containing their email address. Once a victim navigates to the URL, LogoKit fetches the company logo from a third-party service, such as Clearbit or Google’s favicon database. The victim email is also auto-filled into the email or username field, tricking victims into feeling like they have previously logged into the site. Should a victim enter their password, LogoKit performs an AJAX request, sending the target’s email and password to an external source, and, finally, redirecting the user to their corporate web site. ">In the case of LogoKit, a victim is sent a specially crafted URL containing their email address. Once a victim navigates to the URL, LogoKit fetches the company logo from a third-party service, such as Clearbit or Google’s favicon database. The victim email is also auto-filled into the email or username field, tricking victims into feeling like they have previously logged into the site. Should a victim enter their password, LogoKit performs an AJAX request, sending the target’s email and password to an external source, and, finally, redirecting the user to their corporate web site. </span></em>
		</p>
	</div>
</blockquote>

<p>
	This is both interesting and scary as it allows for very fast and dynamic application for bad elements and since it looks quite real and have your email already filled in, chances are that a lot of people will fall for this. Fortunately you often can see in the URL that something is not right. In LogoKit you can often see your email in the url, which look something like this:
</p>

<pre class="ipsCode" id="ips_uid_7611_10">
phishingpage[.]site/login.html#victim@company.com</pre>

<p>
	Sadly this is not a sure way to detect  phishing attack as there are other ways to forward data, but if you see this then at least you know to look at the page you entered a bit more carefully.
</p>

<p>
	LogoKit has seen a big increase in usage in the last month with over 700 unique domains running it. <span class="GenericText-sc-1xizqki-1 kzYunL" data-qa="genericText" value="In the last thirty days, RiskIQ has observed more than seven hundred (700) unique domains running with LogoKit. Targeted services range from generic login portals to false SharePoint portals, Adobe Document Cloud, OneDrive, Office 365, and Cryptocurrency exchanges. Also, RiskIQ has observed several sectors being targeted by attackers, including financial, legal, and entertainment.">Targeted services range from generic login portals to false SharePoint portals, Adobe Document Cloud, OneDrive, Office 365, and interestingly enough Cryptocurrency exchanges. So be alert (as always) when accessing your external cloud services and portals.</span>
</p>

<p>
	 
</p>

<p>
	RiskIQ have concluded that this is a threat on the rise due to it's simplicity and ease of use.
</p>

<blockquote class="ipsQuote" data-gramm="false" data-ipsquote="">
	<div class="ipsQuote_citation">
		Quote
	</div>
	<lt-highlighter contenteditable="false" data-gramm="false" style="display: none;"><lt-div class="lt-highlighter__wrapper" spellcheck="false" style="width: 0px !important; height: 0px !important; transform: none !important; transform-origin: 50% 50% 0px !important;"><lt-div class="lt-highlighter__scrollElement" style="top: 0px !important; left: 0px !important; width: 0px !important; height: 0px !important;"></lt-div></lt-div></lt-highlighter><div class="ipsQuote_contents ipsClearfix" data-gramm="false" spellcheck="false">
		<p>
			<span class="GenericText-sc-1xizqki-1 kzYunL" data-qa="genericText" value="The LogoKit presents a unique opportunity for attackers, allowing for easy integration into either existing HTML pretext templates or building simple login forms to mimic corporate login portals. Also, with the flexibility of either leveraging compromised infrastructure, attacker-hosted infrastructure, or object storage, attackers can quickly change their delivery source. With LogoKit’s intended functionality to be centered around singular emails per URL and extracting company logos, this dramatically improves ease of carrying out targeted attacks against organizations; and reusing pretexts without changing templates.">The LogoKit presents a unique opportunity for attackers, allowing for easy integration into either existing HTML pretext templates or building simple login forms to mimic corporate login portals. Also, with the flexibility of either leveraging compromised infrastructure, attacker-hosted infrastructure, or object storage, attackers can quickly change their delivery source. With LogoKit’s intended functionality to be centered around singular emails per URL and extracting company logos, this dramatically improves ease of carrying out targeted attacks against organizations; and reusing pretexts without changing templates.</span>
		</p>
	</div>
</blockquote>

<p>
	 
</p>]]></description><guid isPermaLink="false">207</guid><pubDate>Sat, 30 Jan 2021 09:09:52 +0000</pubDate></item><item><title>Ubiquiti hacked - the extent of the breach is still unclear</title><link>https://beta.jimiwikman.se/resources/my-articles/professional/698_ways-of-working/operations/ubiquiti-hacked-the-extent-of-the-breach-is-still-unclear-r201/</link><description><![CDATA[
<p><img src="https://ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_01/261751812_Ubiquitihacked-theextentofthebreachisstillunclear.jpg.2a7f52395f0eb9a93a1108ef057dc87f.jpg" /></p>
<p>
	<strong>Yesterday I received an email that the American company <a href="https://beta.jimiwikman.se/companies/north-america/united-states-of-america/ubiquiti-r11/" rel="">Ubiquiti</a> has been hacked. Ubiquiti is i.a. one of the world's largest manufacturers of base devices for WiFi communication. The email contains relatively little information because the company states that they do not know the extent yet.</strong>
</p>

<p>
	Although it has been a long time since I myself used Ubiquiti's cloud service, I assume that it is entirely possible to gain access to the local network via Ubiquiti's central service, hence this is extra serious. I can also imagine that DNS can be reconfigured, firmware can be changed, etc.
</p>

<p>
	What appears in the email is that the username, hashed password, address and telephone number may have been leaked. It also appears that this is a third-party supplier where the leak must have taken place.
</p>

<p>
	The mailing has also been confirmed by Ubiquiti themselves, <a href="https://community.ui.com/questions/possibly-breach/55bc757a-9caf-4889-a2c4-9ad5d8af75ce?fbclid=IwAR1h6Zye3V97HwTvhApR29Sv_69dF3dYyWEllKAZqb_JymqNdmWURL-rW4o" rel="external nofollow">see forum thread here </a>(via the Security Bubble). The mailing went via <a href="https://beta.jimiwikman.se/companies/north-america/united-states-of-america/mailchimp-r12/" rel="">Mailchimp</a> and used i.a. tracking links, which made it initially difficult to determine the authenticity of the email.
</p>

<p>
	 
</p>

<p>
	<img alt="IMG_0171-859x1536.png" class="ipsImage ipsImage_thumbnailed" data-fileid="347" data-ratio="178.81" data-unique="xny49awnb" style="height: auto;" width="859" data-src="//ipsjwse.s3.eu-north-1.amazonaws.com/monthly_2021_01/IMG_0171-859x1536.png.71d32723f048b632275db683ba2a814a.png" src="https://beta.jimiwikman.se/applications/core/interface/js/spacer.png"></p>]]></description><guid isPermaLink="false">201</guid><pubDate>Tue, 12 Jan 2021 14:11:00 +0000</pubDate></item></channel></rss>
