- Why privacy matters: In this TED talk, Glenn Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide”.
- Is your Network Attached Storage (NAS) secure? A proof-of-concept worm was written by security researcher Jacob Holcomb to illustrate how vulnerable such data stores are to malicious attacks.
- SSLv3: POODLE (Padding Oracle On Downgraded Legacy Encryption) is a new attack on the legacy SSLv3 protocol which is considered easier to exploit than similar previous attacks against SSL/TLS. A Security Advisory is available here (PDF). To test if your client is vulnerable SANS setup a Poodle test page. And Heise published a good background article (in german).
- Shellshock: Michael Smith (Akamai) explains why the Shellshock battle is only beginning: The “long tail” challenge of the recently discovered Bash vulnerability. A Shellshock exploit is aleady included in the Mayhem botnet malware kit.
- SandWorm is a zero-day vulnerability impacting all supported versions of Microsoft Windows including Windows Server 2008 and 2012.
- Awareness: The US-CERT reminds users to protect against email scams and cyber campaigns using Ebola as a theme.
- Beware of the air gap risks! Adi Shamir explains at the opening keynote for the Black Hat Europe conference why air-gapped networks are not as secure as usually anticipated. Have fun!
Category Archives: Vulnerabilities
IT-Security-Links #64
- Shellshock I: Shellshock is a term dating from World War I and it refers to the effect of the trauma of battle on troops. But since last week it’s also the name of a serious GNU Bourne Again SHell (Bash) vulnerability, or to be more exact, a series of vulnerabilities (currently CVE-2014-6271,-7169, -7186,-7187,-6277,-6278). Comprehensive technical overviews are available from SANS (PDF) and TrendMicro (PDF).
- Shellshock II: Web servers are indeed currently at the highest risk of being exploited, but the command shell exists all over the Internet. For example there’s also an attack vector in OpenVPN. And Shellshock could also be used to hack VOIP systems.
- DMCA-Takedowns: Warner Bros. Entertainment must now release key information about its automated scheme to send copyright infringement notices to websites.
- WordPress-Security: Security researcher Ryan Dewhurst released the WPScan Vulnerability Database, a one-stop shop for the latest WordPress, plug-in and theme vulnerabilities.
- Google and Dropbox launched Simply Secure to improve online security. The newly created organization aims to make security technologies easier to use.
- How to deal with old Java-based enterprise applications? Deutsche Bank London helped develop an “application self-defense tool” that sits below the application to detect and prevent attacks and apply virtual patches.
IT-Security-Links #63
- Home Depot overtakes Target: While Target’s breach in December ‘only’ exposed 40 million customer debit and credit card accounts, Home Depot confirms that the recent breach impacted 56 million customers. A malware infected its point-of-sale-network between April and September.
- What comes after CVE-2014-9999? The international database for Common Vulnerabilities and Exposures faces its ‘Y2K’ moment. Read more about the syntax change here.
- pEp: pretty Easy privacy is a new crowdfunding project based in Switzerland with the aim to simplify encryption for existing communication tools.
- IptabLes / IptabLex: Akamai has published a threat advisory (PDF) to warn of attacks where cybercriminals are infecting Linux servers with malware capable of launching powerful DDoS attacks.
- Heartbleed: Traffic data collected by researchers on several large networks shows no exploit attempts in the months leading up to the public disclosure of the OpenSSL Heartbleed vulnerability.
- US government ordered Yahoo to hand over user data or pay USD 250.000 fine per day!
- Do you like Online Security Dashboards? techiehow.com compiled a list.
Swiss economy makes online security its priority
Switzerland is one of the safest countries in the world. To make also the Internet a secure place in Switzerland, the Swiss online economy has started the Swiss Internet Security Alliance (SISA). The goal of the alliance is to make Switzerland the “cleanest” Internet country in the world! The organization launched an online security check today which allows internet users to clean and protect their systems.
Offering more security
The founding of the Swiss Internet Security Alliance is a sign of its members’ commitment to making the Internet a secure place in Switzerland. The association brings together expert knowledge from representatives of various sectors and promotes information-sharing amongst competitors.
Overcoming challenges together
The Swiss Internet Security Alliance focuses on its main assets – the knowledge, experience and technical expertise of its members. Its members asut, Centralway, credit suisse, cyscon Schweiz, Lucerne University of Applied Sciences and Arts, Hostpoint, Migros Bank, PostFinance, Raiffeisen, Sunrise, Swisscard, Swisscom, SWITCH, UBS, upc cablecom and Viseca have longstanding experience in dealing with online security. The association is open to other interested parties. More information can be found in the press release:
https://www.switch.ch/about/news/2014/sisa.html
Comprehensive security check
Upon founding the association, the Swiss Internet Security Alliance is launching a security check. The Swiss Security Check provides protection on three levels.
- Users with outdated or incorrectly configured software who are therefore subject to a security risk, will find this out within seconds.
- If there is suspicion of malware, the malware cleaner helps with the diagnosis and resolution of the problems.
- A cyber vaccine completes the protection and keeps electronic pests at bay.
The Swiss Security Check is free and can be accessed here:
http://www.swiss-isa.ch
Please follow @swiss_isa on Twitter!
IT-Security-Links #58
- Troopers14: 27 talks from this years Security Conference Troopers are available online….
- HITB2014: …as well as a choice of presentation slides from Hack-in-the-box…
- IPv6 Security: …and the recently held IPv6 Business Conference.
- Kasperky has uncovered the Luuuk banking fraud campaign which stolen half a million euros in a single week from a single bank.
- Phishing goes Mobile: Hackers have trojanized a legitimate Mobile Banking App and redistributed it on Google Play.
- Update on the “legal” spyware tool “Remote Control System”: Kaspersky discovered a number of related mobile malware modules and 326 Command & Control Server.
- Security experts reproduce NSA’s Advanced Network Technology catalog using off-the-shelf components.
- A Swiss Google alternative: Swisscows.ch is a new search engine which promises “No tracking“.
- A 20-year-old integer overflow vulnerability in the LZO compression algorithm – used by many scientific and open source projects – has finally been patched.
The web is completely broken
The web is completely broken,
sagt sinngemäss Jeremiah Grossman [1], ein alter Hase im Bereich der Web Application Security. Zwar vertreibt seine Firma auch einen eigenen Webbrowser mit Fokus auf Security und vor allem Privacy, Recht hat er trotzdem: Täglich verwenden wir Technologien, welche das Etikett “Broken by Design” tragen (sollten). In diesem Artikel befassen wir uns mit zwei Themen: Cross Site Request (Forgery) CSR(F) und Certificate Authorities (CA). Die Probleme sind seit Jahren bekannt. Heute wurde gerade wieder ein CSRF-Exploit für WordPress 3.9.1 publiziert. Und ja, das ist die aktuelle WordPress-Version.
CSR(F) – Cross Site Request (Forgery)
Cross Site Request Forgery ist im Gegensatz zu seinem Bruder Cross Site Scripting nur marginal bekannt. Dennoch belegte CSRF 2010 in den OWASP Top Ten Platz 5, und im Jahr 2013 immerhin noch Platz 8. Es handelt sich folglich um eine häufige und durchaus kritische Sicherheitslücke in Webapplikationen. Doch was ist CSRF und was hat das mit “Broken by Design” zu tun?
Viele Webseiten binden externe Ressourcen, beispielsweise Bilder, Javascripts oder Werbung, ein. Das Adjektiv extern verweist hierbei auf eine andere Domäne. Ein Beispiel: Was geschieht, wenn man auf die Webseite einer typischen Schweizer Tageszeitung http://www.typischeschweizertageszeitung.ch/ geht?
- Es werden Ressourcen von typischeschweizertageszeitung.ch geladen.
- Es werden weitere Ressourcen von beispielsweise adtech.de, cxense.com, cxpublic.com, visualrevenue.com, wemfbox.ch etc. geladen.
- Es werden von cxpublic.com wiederum weitere Ressourcen von 2mdn.net, serving-sys.com etc. geladen.
Diese Anfragen für externe Ressourcen nennt man Cross Site Requests. Und jetzt? Zunächst muss man sich fragen, wer denn diese Requests im Auftrag von typischeschweizertageszeitung.ch ausführt: der Browser. Anschliessend muss man verstehen, dass dieser Request unter Verwendung sämtlicher lokal gespeicherter Daten (insbesondere Cookies) für diese externe Domäne abgesetzt wird. Schauen wir uns ein relativ harmloses Beispiel an:
<html> <head> <script type="text/javascript"> function csrf() { alert("Auf 192.168.1.1 läuft ein Apache Server unter OpenBSD."); } function nocsrf() { alert("Test fehlgeschlagen, aber vielleicht funktioniert etwas anderes? ..."); } </script> </head> <body> <img src="http://192.168.1.1/openbsd_pb.gif" onload="csrf()" onerror="nocsrf()"> </body> </html>
Breaking News: New OpenSSL Vulnerabilities
Today the OpenSSL team announced new versions of the popular openssl libraries, which fixes several critical vulnerabilities. At the time of writing no exploits are seen in the wild. Never the less we suggest to patch in timely manner.
The following versions are affected:
- OpenSSL 0.9.8
- OpenSSL 1.0.0
- OpenSSL 1.0.1
Most of the popular OS vendors should have patches out by now, or in a short while.