Key security articles for week ending 22-7-22

Key security articles for week ending 22-7-22

I had a need to analyse the week's security news today, so thought I would share. If anyone is interested, I may repeat it in the future, but for now this is all about me :)

21-7-22

The @GCHQ and @NCSC proposals for child safety surrounding end-to-end encryption, all amount to a single premise: that messenger software should [be forced to] lie to its users regarding the privacy that it provides.

  • Takeaway: Another proposed requirement on tech companies to remove encryption from communications, adding to the long line of dissimilar and un-cohesive attempts to eliminate encryption.
  • Takeaway: This discussion has more nuance than any single mind can contemplate. It’s true that individuals have a right to privacy. It’s also true that individuals expect law enforcement to police “bad” activity that is otherwise protected by the right of privacy. Finally, it’s also a prerequisite for most B2B & B2C communications that encryption exists, and has some degree of provable secrecy (+/- quantum resistance). It’s a compleicated set of tensions.
  • Note: The technical likelihood is that the manufacturers of platforms (iOS, Android, Windows, etc.) will comply as best they can without wholesale compromise of all data, yet will likely provide methods of allowing backdoors to be planted on individual devices. Most update services can already individually target individual machines (e.g. iOS upgrades are a per-device upgrade)
  • Also see https://twitter.com/zsentek/status/1550045723663732737?utm_source=substack&utm_medium=email

Heatwave forced Google and Oracle to shut down computers

Continued cyber activity in Eastern Europe observed by TAG

iOS 16 Lockdown Mode will significantly enhance the security of the devices if turned on

A crack in the Linux firewall/ Billions of Linux devices will never be patched for a new netfilter vulnerability

NFT collector loses 100 ETH (~$150,000) in a joke gone wrong

Confluence has another critical bug, with hard-coded credentials

20-7-22

TeamViewer installs suspicious font only useful for web fingerprinting

Russia Released a Ukrainian App for Hacking Russia That Was Actually Malware

In no joking:), I discovered like 17 RCE bugs all in a SINGLE attack surface in Windows, which proved one point I've been talking about for a while. Thread.

Justice Department Seizes and Forfeits Approximately $500,000 from North Korean Ransomware Actors and their Conspirators

19-7-22

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

  • https://arxiv.org/abs/2207.07413?utm_source=substack&utm_medium=email
  • This is just another method of data exfiltration (deliberate or otherwise).
  • Takeaway: Any attacker who can gain physical proximity to a device, or the device’s I/O (including power supply) can directly or indirectly exfiltrate data from a device
  • Takeaway: Any attacker that can run arbitrary code on a device can cause data exfiltration, even over air gaps, over significant distances
  • Takeaway: Where Risk=Likelihood x Impact, for most devices this is low risk, because there are many, many better (faster, remote, more accurate) methods of data exfiltration. For critical infrastructure, airgapped networks and similar, there are fewer options for data exfiltration, therefore the likelihood increases signficantly.

Busting browser fails: What attackers see when they hack your employees’ browser

  • https://blog.detectify.com/2022/07/18/what-attackers-see-when-they-hack-your-browser/
  • Browsers are the new OS. ~70% of all desktop browser sessions are in Chrome. The remainder is Safari, or “others”
  • Takeaway: Browser plugins are terrible for security, and should be avoided at all costs.
  • Takeaway: Sharing data between browsers (i.e. signing into Microsoft/Google/Firefox browser controls) will result in unexpected data exposure

New security research: #PassBleed: How to get @okta master passwords in clear text for all employees

‘Zero Trust’ security is a poor choice of words

A wide range of routers are under attack by new, unusually sophisticated malware

Lock Screen Bypass Exploit of Android Devices (CVE-2022–20006)

Google Play hides app permissions in favor of developer-written descriptions

China faces its first truly mega-leak (1 billion user’s records exposed)

Denmark bans Google Workspace:

Digium Phones Under Attack: Insight Into the Web Shell Implant

Software advertised on social media as a password-recovery and password brute-forcing tool for programmable logic controllers (PLCs) also contains a version of the Sality malware.

Attack vector for GitHub projects

New vulnerabilities in fingerprint sensors and cryptocurrency wallets

Experts concerned about ransomware groups creating searchable databases of victim data

Ongoing phishing campaign can hack you even when you’re protected with MFA

Are blockchains decentralized?

  • https://blog.trailofbits.com/2022/06/21/are-blockchains-decentralized/
  • Takeaway: Blockchains are immature, and likely a bad technical answer for any problem they were designed to fix
  • Takeaway: One day blockchain will be a functional, well designed and secure platform. Check back in 5 years
  • Takeaway: Any product that implements blockchain is likely introducing supply chain risk, vulnerabilities and is not likely to be solving the core problems they claim to solve. Again, this will change in time, but Web 3 has set blockchain back by several years - don’t expect a good solution in the near term

Source articles unashamedly stolen from https://risky.biz/ and https://substack.com/profile/11790324-the-grugq , comments are mine.

Philip Gartlan

General Manager | Enterprise Architect | IT Strategist

2 年

Well I feel less secure now! But seriously, that is a lot of interesting and informed views shared on very current cybersec topics. Thanks for taking the time to summarise and share.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了