STE WILLIAMS

Firefox fires blocks at trackers, Exim tackles 7-day remote flaw, and RDP pops up yet again

Roundup It wasn’t just fake CIA agents, database mega-hacks and Bing flings in the security world last week. Here are a few tidbits beyond what you’ve read in El Reg, among them a seven-day vuln and the scummy BlackSquid.

Exim bug resurfaces with improbable exploit

Are you running the latest version (4.9.2) of Exim on your Linux box? If so, you can go ahead and skip down to the next item, because you’re already clear of danger.

Everyone else may want to consider updating, because older versions of the Linux mail server have been found to contain a command execution vulnerability that has now been confirmed to be remotely exploitable.

The bug, initially thought only to be locally exploitable, was first addressed in February of this year when the latest Exim build was released. At the time, it was not considered to be a major security issue, but rather a minor bug that wouldn’t need to be addressed in older versions.

Fast-forward to May 25, when a team at Qualys discovered a way to remotely exploit the bug to execute commands. This necessitated a patch from Exim that was slated to arrive on June 11, but had to be moved up to the 5th after the issue was made public.

Fortunately, there is little actual danger of exploit at this moment, thanks to the complicated nature of the attack. Actually exploiting the vulnerability would take around seven days of continuous connection to the attack server. Still, it would be a good idea to update your software sooner than later.

Firefox smacks down trackers

Mozilla is continuing the campaign to paint itself as the good guy of the browser world by emphasizing privacy protections. This time, it is a new rule in Firefox that blocks third-party web trackers by default.

While it won’t make advertisers or marketing heads happy, the new setting will appeal to users tired of having their comings and goings monitored by sketchy sites and ad agencies. Mozilla is also going out of its way to assure users the new feature won’t break their favorite sites.

“Because we are modifying the fundamental way in which cookies and browser storage operate, we’ve been very rigorous in our testing and roll-out plans to ensure our users are not experiencing unforeseen usability issues,” said Mozilla’s Peter Dolanjski.

“If you’re already using Firefox and can’t wait, you can turn this feature on by clicking on the menu icon marked by three horizontal lines at the top right of your browser, then Content Blocking.”

Sandbox Escaper strikes again with Edge EoP disclosure

Bug-hunter SandboxEscaper has once again lived up to their moniker by disclosing an exploit that lets users break account protections via a race condition in Edge. The researcher has posted details and a video PoC showing how the flaw can be used to allow an unprivileged user to get admin privileges.

Apple loosens MDM rules for parental control

The notorious control freak Apple has decided to ease up a bit on the restrictions it placed around mobile device management (MDM) tools. In this case, the Cupertino iPhone maker is allowing some parental control tools to once again use its MDM APIs, provided they agree to strict privacy protections − something that had previously caused Apple to block several parental control tools it had deemed were posing a privacy risk to kids.

Citrix gets sued in fallout from employee data leak

Enterprise software house Citrix is the defendant in a class-action complaint accusing it of mishandling the sensitive data of its employees.

Their details were among the 6TB of data apparently pilfered by Iranian hackers. The complaint, filed on behalf of all employees whose data was included in the leak, seeks a jury trial to determine damages, but more likely will be dismissed or settled long before that happens.

Android malware did slip into a phone factory after all

Back in 2017, researchers found that a handful of Android phones appeared to be shipping with a piece of adware already installed. This week, that was confirmed when Google admitted hackers had managed to get the malware into the firmware at the factory level. Fortunately, the phones in question (Leagoo M5/M8 and Nomu S10/S20) weren’t particularly popular, so the outbreak wasn’t catastrophic.

Yet another RDP attack surfaces

No, you’re not having déjà vu and we aren’t just getting around to BlueKeep. This week an entirely new issue in Windows Remote Desktop was disclosed, when Joe Tammariello of SEI showed that an attacker could circumvent a locked RDP session by interrupting and resuming the network connection, thus forcing the session to be unlocked.

Microsoft, however, says this is not a bug, but rather its networking protocols working as designed:

“After investigating this scenario, we have determined that this behavior does not meet the Microsoft Security Servicing Criteria for Windows. What you are observing is Windows Server 2019 honoring Network Level Authentication (NLA). Network Level Authentication requires user creds to allow connection to proceed in the earliest phase of connection. Those same creds are used logging the user into a session (or reconnecting). As long as it is connected, the client will cache the credentials used for connecting and reuse them when it needs to auto-reconnect (so it can bypass NLA).”

To prevent this trick, Microsoft recommends disconnecting RDP sessions when finished, rather than just locking them down.

BlackSquid attack darkens the waters of cryptocoin mining

A particularly nasty strain of coin-mining malware caught the eye of Trend Micro this week.

Dubbed BlackSquid, the infection uses a whopping eight different bug exploits and also employs a litany of evasion techniques to help it avoid detection by antivirus tools. This, the researchers said, allows the malware to run longer and thus generate more digital funbux for the attackers. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/10/security_roundup_070619/

Black Hat USA Offers Fresh Perspectives on Enterprise Cybersecurity

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

Cybersecurity at the enterprise level is a unique beast, and there’s no better place to meet fellow enterprise security professionals and learn new tricks than Black Hat USA in Las Vegas this August.

There’s a whole Enterprise track of Briefings dedicated to the unique challenges of securely managing the big platforms and processes found in enterprises, including large data centers, Active Directory management and bug bounty programs.

For example, Finding Our Path: How We’re Trying to Improve Active Directory Security is a Briefing to see if you’re someone who regularly works with Microsoft’s Active Directory, as it promises to be rich in practical lessons learned from an experienced cybersecurity researcher.

Whether your network has 50, 5,000, or 500,000 computers joined to Active Directory, you’ll walk away from this Briefing knowing how to greatly enhance your organization’s Active Directory security posture in days or weeks, not years.

Plus, On Trust: Stories from the Front Lines will give you some unique insight into what it’s like to lead the security programs of some of the world’s preeminent companies through times of great change.

Speaker Jamil Farshchi helped rebuild (among others) the cybersecurity systems of both The Home Depot and Equifax after their devastating data breaches in 2014 and 2017. At t Black Hat USA he’ll explore how companies, like people, earn trust and develop character — and discuss why a key determinant of that character is their approach to security and privacy..

In Predictive Vulnerability Scoring System two experienced data scientists will show you why it’s so important to efficiently prioritize your vulnerabilities, what we miss by trusting Common Vulnerability Scoring System (CVSS) scores, and what to take into consideration when focusing on vulnerabilities posing the greatest risks to organizations.

You’ll also gain a fresh understanding of the probability of a vulnerability being exploited, based on researchers’ work studying tens of thousands of vulnerabilities and CVSS scores. The speakers will then show you how they used all that data (as well as billions of in-the-wild events collected over five years) in to create a machine learning model for predicting the probability of a vulnerability being exploited, a scoring system which outperforms CVSS on every metric: accuracy, efficiency and coverage.

For more information about these Briefings and many more check out the Black Hat USA Briefings page, which is regularly updated with new content as we get closer to the event.

Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Article source: https://www.darkreading.com/black-hat/black-hat-usa-offers-fresh-perspectives-on-enterprise-cybersecurity/d/d-id/1334908?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Unmixed Messages: Bringing Security & Privacy Awareness Together

Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.

Security and privacy get more attention today than ever before. As professionals in these domains, you are battered by the one-two punch of cyberattacks and an ever-changing regulatory landscape. But deploying technical controls and privacy policies won’t be enough to protect your organization. You’ll need to enlist your employees in the ongoing struggle to keep your data safe and your company in compliance. 

Luckily, when it comes to employee awareness, security and privacy share the same basic goals. Both want employees aligned with the mission to create a more secure, trustworthy, and risk-aware culture. So, it just makes sense to combine security and privacy efforts.

Unfortunately, uniting your efforts is easier said than done. To start, let’s explore how resolving a handful of differences can clear the way for a merger of your security and privacy programs. 

Different Risks
Your mission is probably related to securing personal data. Privacy pros recognize the responsibility to designate secure places to store data, while security pros recognize their responsibility in building and guarding these secure places. A useful simplification, but one that’s complicated by the divergence of risk domains. 

In general, security needs to stop external bad guys, such as cybercriminals and adversarial nation-states, from inflicting harm on your organization. Privacy professionals face a different threat: the mishandling of personal information during day-to-day operations. Even the best employees are fallible, and often privacy-related topics involve questions of ethics and judgment that can be genuinely complicated. 

To you, the privacy or security specialist, these distinctions are clear. But think about average employees. They don’t care about the nuances of which domain or business unit owns which element of data protection … they care about and need the skills to quickly identify and overcome these risks no matter where they originate. The fewer fiddly distinctions, the better.

Different Bad Guys
We have lots of tropes we use as placeholders for external security threats, but most of them evoke a feeling of illicitness or criminality. As a result, security “good guys” tend to emulate law enforcement institutions and use an abundance of military language to describe their work. It’s a simple and direct narrative: We’re the good guys, protecting the innocent and virtuous organization from the bad guys. 

Privacy is different. There’s no one bad guy. Instead, we’re up against a complicated moral landscape where we’re at risk of falling out of compliance with the law and losing the trust of employees and customers. Privacy doesn’t have evil villains, just ill-informed decision-makers and good employees who make preventable mistakes.

If security pros are defenders against outside threats, privacy pros are mentors who must teach the complexities of staying within appropriate boundaries on the collection, use, and storage of data, despite enormous financial pressures to the contrary. 

It’s no surprise that each group sometimes misunderstands the other. “Privacy purists” might judge security advocates to be living in a black-and-white world that is obsessed with technical solutions and an overly defensive posture. “Security strategists,” on the other hand, could see privacy professionals as underestimating threats and being naively dependent on policy to accomplish what should be done with strict controls. 

And we wonder why the employees in the middle tune us out!

Unite and Thrive
The fact is that reaching employees through an awareness program is the best tool available to security and privacy professionals for achieving their common goal. You can begin uniting your training program by doing things like:

  • Presenting the business world as it really is, where the company both creates risk and is at risk from outsiders. 
  • Focusing on the similarities between the security and privacy disciplines, rather than emphasizing the differences in domains.
  • Framing both security and privacy best practices in terms of daily work tasks — whether it’s creating passwords, identifying information that needs special handling, screening email, classifying and storing data, or connecting to networks from outside the workplace. It doesn’t matter which of these are security and which privacy; all are important for protecting the interests of the company and the individual. 
  • Deploying regular and ongoing training, supported by a drumbeat of reinforcing communications. 

The result: reduced overlap, a pooling of resources, and a unified message that invites employees to build the knowledge and skills that they will need to help your organization thrive in a rapidly changing digital world. There are no mixed messages when security and privacy unite.

Related Content:

 

Tom Pendergast is MediaPRO’s Chief Learning Officer. He believes that every person cares about protecting data, they just don’t know it yet. That’s why he’s constantly trying to devise new and easy ways to help awareness program managers educate their employees. Whether it’s … View Full Bio

Article source: https://www.darkreading.com/perimeter/unmixed-messages-bringing-security-and-privacy-awareness-together/a/d-id/1334866?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Security Headline Test

Security Headline Test

Security Headline Test 

Security Headline Test 

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/security-headline-test-/d/d-id/1334764?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Protip: No, the CIA will not call off a pedophilia probe into your life in exchange for Bitcoin

Fraudsters are posing as CIA investigators gone rogue in emails to marks, offering to take bribes to drop bogus investigations into the recipients and claims of online pedophilia, according to Kaspersky.

The security shop says the scammers are spraying out spam messages in which they pretend to be Uncle Sam’s agents conducting a probe into online pedophilia rings, as part of a “large international operation set to arrest more than 2000 individuals in 27 countries.”

The scare-tactic email claims each recipient has been caught up in the sweep, with investigators having collected the mark’s home and work addresses, contact information, and relatives’ details. Additionally, the scammers claim to have recorded each recipient’s ISP and browsing history, Tor browsing activity, chat logs, and social media activity.

After rattling off the list of details supposedly collected, we get to the pitch. The bogus CIA g-men propose a $10,000 Bitcoin payout to get the whole matter settled.

“I read the documentation and I know you are a wealthy person who may be concerned about reputation,” the message reads. “I am one of several people who have access to those documents and I have enough security clearance to amend and remove your details from this case.”

Blackmail

Sextortion on the internet: Our man refuses to lie down and take it

READ MORE

Obviously, there is no such investigation, and the sender is a scammer with no CIA connection.

In this case, the crooks would only need to convince ten people out of the mass of recipients to pay up in order to reap a six-figure windfall. Think of it as a sort of reverse spear-phishing operation.

“Such messages are sent to thousands or even millions of people in the hope that just a handful will swallow the bait,” noted Kaspersky senior anti-spam analyst Tatyana Scherbakova earlier on Friday.

“Given the size of the ransom, if even a few victims pay up, it will have been worth the cybercriminals’ time and effort.”

Folks who receive this message should keep in mind that the CIA and its agents (even the corrupt ones) would not make any such demand over unsolicited email, and the message should be deleted without a second thought.

Scamming aside, the unsettling implication in all of this is that some of the people who would be inclined to pay this extortion demand would be people that had in fact been viewing child abuse images. In that case, it is scammers looking to get money from rapists, and nobody comes out looking good. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/10/kaspersky_cia_sextortion/

Idle Computer Science skills are the Devil’s playthings

Who, Me? Ah, the sweet, sweet smell of Monday. What better way to start your week than combining it with the latest confession of wrongdoing from The Register readership in the form of our weekly Who, Me? column.

Today’s blast from the past comes from a somewhat unrepentant reader we shall refer to as “Charles”.

Take yourself back to the 1980s, the derring-do of Vulcan 607, Peter Davison as Doctor Who and a period when mainframe time at UK establishments of higher learning was a precious thing.

Young Charles was a first year student, studying Computer Science and, by all accounts, a bit of a bright spark. Perhaps a tad too bright.

He’d completed his assigned coursework in no time at all, “leaving,” as Charles put it, “plenty of time to think of things I probably shouldn’t have thought of.”

The Devil makes work for idle hands and all that.

Charles’ educational establishment had a bunch of green screen terminals scattered around the Computer Science building attached to a mainframe. Rather than hitting the student bar, Charles occupied his downtime by tinkering with code, “including a small program emulating a login screen, that dumped the entered username and password in a file in my own home directory”.

It’s good to know that almost 40 years ago, miscreants were spoofing login screens to catch unsuspecting users.

Charles told us: “I ran it one night, got hold of one user’s details, and then ran it from that user’s account, dumping the login details into a file in his home directory, accessible by everyone.

“And then ran it from about 10 users’ accounts, doing the same thing.”

Charles had, up to this point, been merely curious. While the japery had worked well, “I had absolutely no intention of doing anything bad with any of these accounts and forgot about them for a while”.

However, there are few things more dangerous than a geek with time on their hands, and Charles began looking into the world of scripting, coming up with three lines to strike fear into the heart of a BOFH.

Create directory foo 
Change directory to foo 
Go to start

(The above is a made-up language known as Reg-pseudo-script.)

Charles hit go, expecting the OS to call a halt to his shenanigans: “I didn’t expect it to actually carry on running, creating nested directories thousands deep, but it did.”

Oops. Deleting the things took over an hour after the script had been left to run for a minute or so.

We’ll leave the next bit to Charles: “Then the evil demon in me appeared and suggested, ‘Wouldn’t this be fun if you ran it from 20+ user accounts at the same time?'”

The demon won and Charles unleashed the horror before rapidly exiting the Computer Science building. He passed the establishment’s crew of BOFHs and PFYs “running full pelt to the terminal room I’d been in”.

The result of Charles’ prank? “They had to take the whole system offline, and sorting the mess out took many, many hours.” To further rub salt into the IT department’s wounds: “System processing was leased out to customers, so they must have been happy too.”

Overjoyed, we suspect.

In an unusual turn of events, Charles was caught and a suitable punishment administered.

As for what happened, well, what would you have done with a student who managed to take down the mainframe?

We’ll reveal Charles’ fate in the next edition of Who, Me?

Ever done something you wish you hadn’t or are secretly proud you did? Of course you have. Tell us all about it. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/10/who-me/

Dark Web Becomes a Haven for Targeted Hits

Malware on the Dark Web is increasingly being customized to target specific organizations and executives.

Malicious services offered on the Dark Web are more like precision arms than blunt instruments, and they’re taking aim at the biggest of businesses.

New research, conducted by Dr. Mike McGuire of the University of Surrey, shows four in 10 Dark Web vendors are selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses. Among the information and services McGuire found on the Dark Web, access to corporate networks is sold openly, with 60% of vendors approached by researchers offering access to more than 10 business networks.

Still, sites and messaging facilities on the Dark Web have become havens for those seeking and selling custom-built, highly targeted malware, McGuire writes in “Into the Web of Profit: Behind the Dark Net Black Mirror Threats Against the Enterprise,” the third in a series. If you want to target a particular industry, organization, or executive, it doesn’t take long to find vendors willing to help meet your nefarious needs.

“The rise of customized malware-as-a-service is nothing more than the natural evolution of the commercialization of malware authors and other malicious actors,” says Nathan Wenzler, senior director of cybersecurity at Moss Adams. Online criminal activity has become industrialized, he says, with those on both sides of the transactions treating it just like legitimate business deals.

“Once you’ve reached that point of creating a product, which in this case is malware, the next logical step is to provide the equivalent of professional services to your customers,” Wenzler says.

What we’re seeing in these Dark Web sites is an almost inevitable consequence of the market’s maturity. Ray DeMeo, co-founder and COO at Virsec, points out that the criminal world is become more sophisticated, efficient, and compartmentalized, just like legitimate business. As a result, “Specialists are focusing on specific pieces of the supply chain, such as password theft, memory attacks, ransomware, and selling personal data in bulk,” DeMeo says. “As part of this, many resources on the Dark Web have become Amazon-like, relying on building ‘good’ reputations with high-quality stolen data.”

One of the consequences of malware and attacks heading to the commodity “as-a-service” model is that it now takes much less expertise to launch a relatively sophisticated attack. “[Cybercrime is] becoming more transactional in nature and lowering the barriers to entry for those who may not have the technical skill to develop a new malware variant,” says Harrison Van Riper, strategy and research analyst at Digital Shadows. “Those with less technical skill can still have access to damaging malware for a reasonable price.”

That price, which McGuire found ranged from $150 for a relatively simple piece of malware to more than $1,500 for software designed to target specific ATMs, often includes performance guarantees and sophisticated customer service. Encrypted messaging services like Telegraph are frequently used as the medium for support, though some malware networks have communicated completely in the clear over YouTube, Instagram, or other social network comments.

All of this is possible because malware and attack authors have swung their production to agile development methods, up to and including full DevOps, Wenzler says. “These groups already have automated much of the malware creation and management processes as it is, so creating custom attacks for a higher price is a relatively trivial thing for them to do and comes with the benefit of increasing their financial gains without needing to expend much effort,” he says.

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/dark-web-becomes-a-haven-for-targeted-hits/d/d-id/1334914?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Massive Changes to Tech and Platforms, But Cybercrime? Not So Much

The still-relevant recommendation is to invest more in law enforcement, concludes an economic study of cybercrime.

In 2012, a group of cybersecurity researchers and social scientists studied the impact of cybercrime and its cost to society, concluding that the money spent anticipating an attack is less effective than money spent responding to an attack.

This week, many of the same researchers released an updated paper at the Workshop on the Economics of Information Security (WIES) conference, in Cambridge, Mass., that looks at direct and indirect damages due to cybercrime, as well as the cost to defend against the crimes. Their conclusion? While people and technology are more interconnected and different platforms have become dominant, the overall impact of cybercrime remains relatively the same.

“One of the lessons of the paper is that, although there’s been huge changes — new platforms, some crime types replacing others, etc. — the overall picture is little changed,” says Richard Clayton, a co-author of the paper, director of the Cambridge Cybercrime Centre, and a security researcher at the Computer Laboratory at the University of Cambridge. “That’s because fixes are not technical but have to do with incentives, economics, criminal justice, sociology, [and] criminology.” 

The latest research attempting to quantify the costs of cybercrime comes as estimates for the market for cybersecurity products and services continue to grow. Largely unsupported estimates of cumulative annual growth vary from 9% to 18%, and estimates vary from $119 billion in 2019 to more than $300 billion in 2024.

Similarly, the cost of cybercrime has been a quantity of much speculation. One firm estimates costs of about $1 trillion annually in 2019, while another estimates a supersized $6 trillion in yearly damages by 2021.

The paper presented at WEIS aims to inject some sanity into all of these estimates, representing the most complete look at the state of cybercrime without relying on data collected by companies that are trying to sell security products, says security expert Bruce Schneier, a lecturer at Harvard University’s Kennedy School of Government.

“It is the best data that we have that isn’t being driven by some corporate agenda,” he says. “To me, that is the key for why this is important. They don’t have a dog in the fight. They are just trying to figure it out.”

For the most part, the paper underscores the unreliability of current data. Among the best data is payment fraud, which has doubled in total volume since 2012 but has decreased as a percentage of the total amount of payments. 

The paper finds that only a dozen or so crimes — such as online credit-card fraud, cryptocrime, ad fraud, and telecom fraud — actually result in more than $1 billion in damages. However, new ways of doing business using connected devices has resulted in new pathways for fraud; the world has changed since the original paper, the authors stressed.

“New apps, such as ride hailing, and new technologies, such as cryptocurrencies, create new targets, while old targets, such as medical records, have migrated to cloud services,” they wrote. “So larger quantities of personal information are kept online and are open to a variety of attacks.”

This leaves the authors with little advice for the average user or small or midsize enterprise (SME), Clayton says.

“It might make sense to replace your Windows machines with Chromebooks because that allows you to eliminate some attack types,” he says. “But, generally, the step change in response is needed by law enforcement, not SMEs.”

The actual economic problem is paying for defenses for every person is extremely inefficient. The cost of securing their systems outpaces the damages caused by cybercriminals. Instead, nations should focus on empowering law enforcement to pursue and punish cybercriminals, the authors argued.

“The core problem is that many cybercriminals operate with near-complete impunity,” the paper states. “We will not get a real handle on cybercrime until we put an end to impunity.”

Yet that remains a difficult, Schneier says.

“That is easy to say and hard to do anything about because it is so international,” he says. “A lot of the impunity comes from the difficulty of reaching into some country in, say, sub-Saharan Africa and exacting penalties.”

In addition, attempts by the United States to hold actors from larger countries accountable has typically failed. In 2018, as part of the Mueller investigation, the US government issued arrest warrants for 12 Russian nationals who allegedly took part in that country’s interference in the US elections. To reduce the cost of cybercrime, such actions need to become more common and effective, the paper stated.

Related Content:

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/massive-changes-to-tech-and-platforms-but-cybercrime-not-so-much/d/d-id/1334911?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Vulnerability Found in Millions of Email Systems

The vuln could allow remote execution of code with root privilege in more than 4.1 million systems.

Security researchers at Qualys Common discovered a remote command execution vulnerability in older versions of mail transfer agent (MTA) Exim — a critical, open source piece of the email infrastructure in many organizations.

An MTA functions much like a router dedicated to email. Researchers have found more than 4.1 million systems are potentially vulnerable to the flaw.

Exim’s maintainers acknowledged the vulnerability (CVE-2019-10149) on June 3. Present in Exim 4.87 through 4.91, the vulnerability could allow an attacker to execute commands as root, with no privilege escalation required.

According to researchers at Tenable, no exploits have been seen in the wild, though they expect at least proof-of-concept exploits to appear in the near future. In the meantime, the vulnerability has been patched, though a Shodan scan executed by Tenable researchers on June 6 showed just 475,591 running updated and patched versions of Exim.

Read more herehere and here

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/vulnerability-found-in-millions-of-email-systems/d/d-id/1334913?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Researchers eavesdrop on smartphone finger taps

Researchers have been experimenting with a novel way to eavesdrop on what you’re typing on your smartphone: They listen to the interaction between your fingers and the screen.

In a paper called Hearing your touch: A new acoustic side channel on smartphones, academics at the University of Cambridge claim to demonstrate…

The first acoustic side channel attack that recovers what users type on the virtual keyboard of their touch-screen smartphone or tablet.

In tests, they showed moderate success guessing what users entered into the software-based keyboard devices.

According to the researchers’ paper, when users tap out numbers and letters on a smartphone’s virtual keyboard, it generates a sound wave that travels both on the surface of the screen and in the air. The location of the user’s finger on the screen distorts the wave, and the microphone on the mobile device picks up this distortion, enabling an algorithm to “hear” what the user typed.

To make it work, the researchers use machine learning (a form of artificial intelligence) to train their algorithm using around 21 hours of audio recordings of finger taps.

They tried out the attack with 45 participants in a real-world environment, using both an Android tablet and an Android smartphone. On the smartphone, they tried listening to four-digit PIN codes and were able to retrieve the correct codes 61% of the time within 20 attempts.

On the tablet, they successfully retrieved 9 codes between 7 and 13 characters in length in 50 attempts.

Should you be worried about this?

Probably not. For it to work, an attacker would have to install malware on your device. Then, you would have to give it access to the device’s microphone. And if an attacker is running malware on your smartphone, you’ve got a lot more to worry about than whether it can listen to what you’re typing.

The speed of sound in air depends on temperature, meaning that the results might be skewed if it’s too hot or too cold (the researchers only tested in a relatively tight temperature window because of this). They also said that an additional glass layer on top of the screen could absorb most of the finger impact, making an effective countermeasure. User-installed protective glass and plastic coatings are pretty common on phones now to protect those increasingly large screens. Less so on tablets, though, admittedly.

All in all, this was an interesting intellectual exercise, but there are easier ways to slurp a target’s data. It might make for a fun scene in a Hollywood movie with a credulous audience, though.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/s2Vt_giEww8/