Cyber Security Weekly Briefing 28-31 december

Telefónica Tech    3 January, 2022

Smishing campaign impersonating MRW and Sending using real order data

Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The first reports were made on 26 December, when customers of brands such as Pampling, Druni and Primor reported that Sending, their courier service provider, had suffered an incident and that SMS messages were being sent in the name of Sending requesting bank details in order to complete the delivery of an order. What is relevant in this case is that the SMSs received referred to real orders that had been placed, according to the users themselves, which is why a possible leak of information at Sending has been raised, which is being used by the attackers to give credibility to the SMSs sent. The SMSs include personal information such as the name and type of order, as well as a URL that refers to an illegitimate domain “envios-sending[.]com”, together with a parameter created so that the phishing can only be viewed by the user. When accessing the link, a phishing case can already be seen with a request for the user’s bank details in order to formalise the sending. In the last hours of yesterday afternoon, reports of cases against MRW for the same fraud also began, forcing the company to launch a notification to its users warning them of the importance of not entering bank details requested via SMS. In this case, as with Sending, an illegitimate domain “envios-mrw[.]com” was also used. Since the beginning of this campaign, users on social networks denounced a “hacking” of these companies, this hypothesis was confirmed in a statement issued by MRW on 29 December, where they indicated that they had notified a security breach to the Spanish Data Protection Agency, stating that the identity and contact details of the receivers had been affected. On the other hand, Sending warned its users about the security breach on the 27th by SMS.

All the details: : https://www.mrw.es/comuns/noticia/sms-mrw-smishing.pdf

Vulnerabilities in DataVault storage encryptions

Security researchers have reported two new vulnerabilities in DataVault software, and its derivative systems, used for data encryption in storage solutions from WD (owner of SanDisk), Sony or Lexar. One of the flaws is due to the use of a cryptographic hash with a predictable salt, which makes them vulnerable to dictionary attacks (CVE-2021-36750). The software also employs a password hash with insufficient computational effort, which would allow an attacker to obtain user passwords through brute force attacks, thus exposing the data to unauthorised access (CVE-2021-36751). Both flaws in the key derivation feature have been resolved in DataVault version 7.2, so it is recommended that the software be upgraded to that version immediately.

More info: https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3/

LastPass user master password exposure reports

Several users have reported in recent hours a possible compromise of their LastPass password manager master password. The reports come after they received a lockout notice of unauthorised access to their LastPass account from an unknown location. According to the company, no evidence has been found of the exposure of their data, meaning that the blocking would have been carried out because the users had reused these credentials in other services, so that they could have been exposed as a result of their use in those other services, and could be susceptible to being used in credential stuffing attacks. However, this justification by LastPass does not fit, according to some users, with the reports that they have allegedly received again after setting up new unique passwords. It is also raised as a possibility that the warnings were sent in error. It is unknown, therefore, whether or not there has been any exposure of credentials and the vector by which they could have been exposed. For his part, researcher Bob Diachenko has checked whether some of the users who have reported having received the warnings were included among those affected by malware such as RedLine, also ruling out this option. LastPass has recommended activating two-factor authentication to prevent unauthorised access. This incident highlights the importance of never reusing passwords between services, especially when it is the main password of a password manager.

All the information: https://www.bleepingcomputer.com/news/security/lastpass-users-warned-their-master-passwords-are-compromised/

New arbitrary code execution vulnerability in Log4j

This week, security researcher Yaniv Nizry spread once again chaos with a Twitter post warning of the discovery of a new remote code execution vulnerability in Log4j, affecting the latest version 2.17.0. Some prominent researchers such as Kevin Beaumont invited people to remain calm until more details were known and, within minutes of the publication, they warned of the detection of alleged exploits for this new bug that were nothing more than trojans; a common practice when media bugs such as the current one are reported. A few hours later, the researcher Marc Rogers published the CVE associated with this new vulnerability, CVE-2021-44832, and also indicated that the exploitation of this flaw requires a prior change in the default conditions, which complicates its exploitation. This same idea was immediately shared by other renowned researchers such as Will Dorman, who yesterday, after Yaniv Nizry’s research was made public, criticised Checkmarx, the researcher’s firm, for creating a situation of alarm with this new flaw. Exploiting this flaw requires the attacker to have administrator permissions on the very system to be compromised, since, in order to exploit it, the attacker must first be able to modify the logging configuration file. This idea does not make much sense in itself, but some users insist on pointing to the figure of the insider, who modifies the file, as a possible risk (although it is true that, if there is an insider, there are other greater risks). That said, we are therefore dealing with an arbitrary code execution vulnerability, not a remote execution vulnerability as initially thought, and it would have received a moderate criticality, with a CVSSv3 of 6.6. The specific flaw is due to the lack of additional controls on JDNI access in Log4j. Apache has now released version 2.17.1 to fix the bug. Despite the self-attribution of the bug by Yaniv Nizry, who has also published an article detailing his research, Apache has not included his name in the credits for the vulnerability.

Know more: https://logging.apache.org/log4j/2.x/security.html#CVE-2021-44832

Most read content in 2021

Telefónica Tech    30 December, 2021

The end of the year is approaching and from the Telefónica Tech blog we wanted to make a compilation of the contents that have most engaged our audience, technology by technology. Are you ready to discover them? Here we go!

Blockchain

We like to look back and see how we have evolved. In Blockchain technology too:

Edge Computing

This has undoubtedly been the year in which we have begun to learn more about Edge Computing. A technology that, a priori, may seem complex, but which, when explained in a simple way, has got us hooked:

IoT, Big Data and Artificial Inteligence

This information about the most famous programming language of recent times has been, without a doubt, the most read content of AIofThings:

Cybersecurity

Because we all love stories, this year we have taken a keen interest in cybersecurity through one that is well known to all:

Cyber Security Weekly Briefing 18 – 24 December

Telefónica Tech    27 December, 2021

Log4Shell Vulnerability (update)

Through the week new details and comments around the vulnerability known as Log4Shell have continued to appear. First, a new denial-of-service vulnerability affecting Log4j2 on versions from 2.0-alpha1 to 2.16.0, was made public. The patch of this flaw, known as CVE-2021-45105 CVSSv3 7.5, has provoked the publication of the 2.17.0 version.

Also, new active exploitation campaigns have been detected, this time by the operators of the TellYouThePass and Conti ransoware, as well as by the developers of the Dridex and Meterpreter trojans. On this matter, Netlab published a report to show the data observed in their honeypots. They identified samples of over 30 malware families being distributed from IP addresses from more than 50 countries. The most notorious malware detected in this honeypots were miners such as Kinsing or Xmrig, as well as binaries from families such as Dofloo, Tsunami (aka Mushtik) or the Mirai botnet. As per the active attacks, the Belgian Ministry of Defense confirmed an attack against its systems that disrupted its activities over several days. It is believed that the vector of attack was Log4Shell exploitation. Finally, Investigators from Blumira published information on a new attack vector that allows the vulnerability to be locally exploited in servers using a Websocket connection from JavaScript.

Also this week, the Five Eyes Alliance, which includes the governments of Australia, Canada, New Zealand, United Kingdom and the United States, has published a new joint security warning include a series of recommendations for those affected by the Log4Shell flaw. In the US, the CISA has issued “log4j-scanner”, a new tool designed to scan and identify web services vulnerable to any of the two remote code execution bugs found in Log4j (CVE-2021-44228 y CVE-2021-45046), while in China the Ministry of Industry and Information Technology (MIIT) suspends their CyberThreat and Information Exchange Platform collaboration agreement with Alibaba Cloud Computing for at least six months after researchers from Alibaba failed to warn about the Log4j vulnerability before the announcement by Apache.

Know more: https://logging.apache.org/log4j/2.x/download.html

Meta takes action against surveillance-for-hire companies

Facebook’s parent company Meta has announced that after months of investigation it has removed seven companies in the surveillance-for-hire industry from its platforms for targeting victims in more than 100 countries to collect information, manipulate and compromise their devices and accounts. This activity reportedly impacted approximately 50,000 users who have been notified of malicious activity. The eliminated companies come from different countries such as China, Israel, India and North Macedonia, and are operating against their targets in three phases: recognition, through automated software, compromise, in which they seek to gain the trust of their victims, and exploitation, through the distribution of phishing with the aim of obtaining credentials. Meta points out that, although these campaigns are usually dealt with in the exploitation phase, it is essential to interrupt the life cycle of the attack in its early stages to prevent devices and user accounts from being compromised later on. Given the severity of their breaches, Meta has reported that in addition to removing these companies from its platforms, it has blocked their related infrastructure, issued cease and desist notices, notifying them that their activity has no place on the firm’s platforms, and shared its findings with researchers, other platforms and authorities for appropriate action.

All the details: https://about.fb.com/wp-content/uploads/2021/12/Threat-Report-on-the-Surveillance-for-Hire-Industry.pdf

Google publishes in-depth analysis of NSO’s FORCEDENTRY exploit

Google’s Project Zero team recently published an in-depth analysis of NSO Group’s FORCEDENTRY exploit, which they consider to be one of the most sophisticated exploits they have analysed, putting NSO’s tools on par with the sophistication of state-sponsored Advanced Persistent Threats (APTs). The sample, analysed in collaboration with Apple’s Security Engineering and Architecture (SEAR) team, has been selectively distributed throughout the year against activists, dissidents and journalists in different regions. FORCEDENTRY uses a zero-click or non-interaction technique, which means that victims do not need to access a link or grant specific permissions for the attack to proceed. In addition, this exploit uses a number of tactics against Apple’s iMessage platform to bypass the device’s protections, take control and install NSO’s notorious Pegasus spyware. The vulnerability leveraged by this exploit (CVE-2021-30860 CVSSv3 7.8) has been fixed since September 2021, in iOS version 14.8. This same exploit has been observed by Citizen Lab being used in an attack against a Saudi activist in which Pegasus was allegedly used in conjunction with Predator, software developed by Cytrox, one of the “on-demand surveillance” companies reported by the Meta team that have been removed from their platforms.

Learn more: https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html

Gift survey campaigns generate $80 million a month for malicious actors

Group-IB’s research team has published research analysing that cybercrime generates approximately $80 million per month as a result of fraud schemes using giveaway surveys to collect personal and banking information. Malicious actors lure victims by using website advertising, SMS, emails and/or pop-up notifications under the pretext of winning a prize from a well-known brand by participating in a survey. Among the characteristics of these campaigns is that the infrastructure used allows malicious actors to display different content to different users, depending on certain parameters. This is because several redirects are made when accessing these links, during which information is collected from the user that will end up displaying content tailored to the victim. Furthermore, the final link is customised for the specific user, being accessible only once, complicating the detection of these malicious sites. Finally, it should be noted that these campaigns target more than 90 countries, with Europe being the most affected region, and that the number of impersonated companies exceeds 120.

All the information: https://www.group-ib.com/media/target-links-2021/

How can we make water consumption more efficient?

Jorge González    23 December, 2021

Thanks to new technologies that help connect objects or machines, such as NB-IoT or LTE-M, we can provide answers to how to optimise and make water consumption more efficient.

Water utilities, and the water industry in general, face one of the biggest challenges: digitalisation.

These technologies are having a major impact by enabling connectivity to a multitude of new IoT use cases and by addressing five key market needs:

  1. Provide quality and availability guarantees in communications as they are licensed band technologies.
  2. Massive and efficient connection of a large number of dispersed or highly concentrated devices, improving coverage in remote or underground locations.
  3. Have mechanisms to cut signalling totally or partially, thus extending battery life by up to 12 years.
  4. Being future technologies, currently available, with no risk of obsolescence and being compatible with 5G.
  5. Versatility and robustness by being compatible with other data technologies, SMS or SWAP service (change of operator subscription by reusing the same SIM card).

Telefónica Tech is committed to these technologies to help our customers optimise and make the most valuable resource we have, water, more efficient.

A great example can be found in the city of Valencia, where we deployed this connectivity for our client Global Omnium to carry out the remote metering project.

Today, Global Omnium has more than 800,000 remote water meters, making them national leaders and one of the largest implementations in Europe.

We were lucky enough to visit their facilities and learn first-hand about all the details of this project.



“Our mission at Global Omnium is to sensor the network as much as possible. In this way, we can capture as much information as possible so that, if necessary, we can act on the network in a centralised manner. All of this with the aim of ensuring that when citizens turn on the tap they have quality water, with pressure, and receive a bill on time and without estimates,

Alberto Palomar, meter area manager at Global Omnium.

There are many benefits to remote metering and they help both the company and the citizen. Víctor González, director of remote metering and meters at Global Omnium, explains some of these benefits.

On one hand, for the citizen we can find all these advantages:

  • Warning of possible leaks in your installations.
  • Effective reading of all meters without estimations.
  • Reduction of complaints

We provide companies and public authorities with the possibility of calculating their water footprint and the social services of local councils with the possibility of monitoring the homes of vulnerable people living on their own.

On the other hand, for Global Omnium of course, we highlight the following benefits:

  • Optimised meter fleet management
  • Hourly water balances to detect leaks in distribution networks
  • Control of unauthorised water consumption
  • Identification of stalled or faulty meters.

Finally, the most important benefit is to move towards sustainability. So, we have reduced water consumption by more than 5 cubic hectometres per year to provide the same service, which translates into a reduction in emissions of more than 1,400 tonnes of CO2.

A challenge that once again demonstrates Telefónica Tech’s capabilities as a partner in the digital transformation of our customers. Great advances that contribute to a better world.

Leave a Comment on How can we make water consumption more efficient?

Artificial Intelligence in fiction: Eva, by Kike Maíllo

Santiago Morante Cendrero    23 December, 2021

Are you afraid your food processor will rebel and poison your lentils? Do you think your Roomba is watching you? Do you wear a hat when you see a drone? Then this is the place for you. Today we begin a series of articles on the treatment of Artificial Intelligence in films and series, analysing it from the point of view of the current state of technology, assessing how realistic the emerging technologies are.

And why should you believe me? Let’s say that until a few years ago I was doing research on robots, simulating them, programming them, and I even wrote a dissertation on them… Shall we start?

Plot

We open this series with a rather unknown Spanish film, Eva (2011) by director Kike Maíllo, which is probably my favourite film in terms of its treatment of robotics. The film is set in the near future, 2041, in a world where humans coexist with robots that are used for repetitive or heavy tasks, such as cleaning or carrying groceries.

In this context, Alex (Daniel Brühl), a cybernetic/robotic engineer returns to his village after a prolonged absence, with the university’s assignment to create the first child robot. The film focuses on the relationships between the main character and the family he left behind and features some surprising plot twists.

Robotics that already exists

In the film, Artificial Intelligence and robotics are treated in two very different ways. On the one hand, we have the majority of robots, whose physical structure and intelligence are completely realistic and feasible today or in the near future. From mobile-based assistants, such as PR2, to quadrupedal cargo-carrying robots, such as those produced by Boston Dynamics, these robots represent the commercial version of what is currently in universities or in certain industries. Of particular note is Alex’s cat-robot, which is almost a stylised version of Spot.

The robotics that we wish existed

On the other hand, there are a few robots, such as the assistant Max (Lluís Homar), whose intelligence, appearance, feelings and movements rival those of humans. These robots are the most futuristic part.

Let’s analyse their characteristics in detail. Let’s start with the movement capacity. The realistic and stable movement of robots is a long-standing research topic that, apart from Boston Dynamics with Atlas, no one has managed to solve adequately.

Realistic outward appearance, to the point of being mistaken for a human, is an area where art and engineering go hand in hand. Some current developments may momentarily fool a naïve (or myopic) observer, but none withstand the challenge of facial movements, being easily detectable that we are not looking at a person.

As for feelings… what exactly are they – appropriate external expressions in the face of certain events? In that case, there is a field of study that, together with the previous point, will at some point achieve realistic results. But if you consider feelings to be more than just facial expressions, then I’m afraid the engineering hasn’t gone that far.

Some studies consider artificial emotions to be drives that the robot seeks to keep in range (such as being happy and not sad, for example). However, a problem comes in determining what it means for a robot to be happy or sad (does being angry or elated must affect its decisions?) or how situations have to influence it (does it become sad if its battery runs out?). Even thinking further, why would we want a robot with this functionality? What does it bring to its job? We could end up with depressed robots going to the robopsychologist.

In short, the intelligence that the film proposes in these quasi-human robots falls far short of what engineering has achieved so far and is the least credible point of the technology that is presented.

Retrofuture

Other technologies not directly related to artificial intelligence are inspired by existing technologies or those that are projected to exist soon, such as visual touch interfaces to control the computer (bear in mind that the film is from 2011 and that Microsoft Surface, for example, was launched in 2012), or navigation indicators projected on the windscreen of the car (like the head-up displays of some vehicles).

As for the holograms that the protagonist uses to watch videos or to design the robot’s brain, it has not yet been possible to do without a physical medium. However, it does not seem so ridiculous to think that by 2041 there could be a more or less functional version of what we see on the screen.

Rating

Eva is a great film that is characterised by its good integration of advanced but manageable technology into a recognisable everyday environment and, with the exception of a few overly fantastical elements, achieves a good overall effect of realism.

In order to be able to make a ranking of films and series in the future, we are going to rate the degree of realism of each technology presented, using a scale (out of 5):

  • Artificial Intelligence: 5/5 for non-humanoid robots, 2/5 for humanoid robots, then we give it a 3.5/5 on average.
  • Robotics: 4.5/5
  • Other technologies: 4/5
  • Resultado:  4/5 de realismo tecnológico

Availability: Eva was available on Filmin but is no longer available on the major platforms. It is available on Amazon.

2021: the year Edge Computing came into our lives

Emilio Moreno    21 December, 2021

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my personal case, in 2021 Edge Computing has entered fully, as I have been lucky enough to take on responsibilities in the area.

2021 has been an important year in the Edge Computing relationship for Telefónica. From an infrastructure point of view, we already have a commercial offering (VDC-Edge) that allows our customers to enjoy the benefits of Edge.  In parallel, we have shown new examples of innovation with our customers in the area, demonstrating that there are technological challenges that can be solved by this new paradigm.

However, there is always a margin of doubt about the real impact it is having – is it just a fancy term that the whole industry is eager to embrace? Some time ago, when the term Cloud Computing started to become popular, I remember seeing “classic” solutions that with a little coat of varnish were quickly postulated as Cloud solutions.

One of the leading technology analysts, Gartner, positioned the term Edge Computing in August this year, at the top of the “peak of inflated expectations” of its classic “Hype Cycle”.

Obviously, when expectations are high, there is a risk that they may not fully materialise and lead to disappointment.

In this particular case, regardless of the illusions of each actor in the industry, I see some factors that I find interesting and that make me think that the impact of the Edge is going to be very significant. It is unlikely that we will ever have “before the Edge” or “after the Edge” time references, but it is going to have a significant impact on our lives.

One of these is the arrival of “real” 5G, 5G SA (StandAlone). Although we have already been enjoying 5G for months, the deployment of the SA version will mean the arrival of new capabilities, such as Network Slicing, which represent a huge leap forward. And we must not forget the latent geopolitical conflict in relation to 5G between China and the USA, which could lead to the world being divided into isolated technological blocs. This latent rivalry shows that 5G is more than just a multi-billion-dollar market, but that it directly and powerfully influences other economic sectors and our lives in general.

The other is that we are working intensively with partners and end-users to identify use cases that demand this technology, and to improve the offering and create a new generation of services to users. This is a substantial change from the classic approach of designing a product, launching it and waiting for demand to come. In my view, it will help our business customers to imagine services, technologies and use cases that they could not even contemplate before, and that will rely on Edge to get to market.

So, let’s hope we see the Edge explode in 2022. And in the meantime, Merry Christmas and 2022 to all of you!

Leave a Comment on 2021: the year Edge Computing came into our lives

Onboarding and biometric authentication to fight online fraud

Alexandre Maravilla    20 December, 2021

Online fraud has experienced a significant growth since the early 2020s pandemic accelerated the digital transformation of businesses and citizens. This is evidenced by the latest report from the Spanish Anti-Fraud Association, in which 71% of respondents say that in recent months there have been more fraud attempts than last year, with customer identity fraud being the most recurrent in companies according to 58% of respondents

What is customer identity fraud?

The type of fraud whereby fraudsters use legitimate customer data to impersonate a customer, both at the time of opening an account or registering for a service (Onboarding), and at the time of accessing the account or previously contracted services (Authentication).

Account Opening Fraud

Attackers try to circumvent the identity and fraud prevention controls in the onboarding process by using stolen real identities, or synthetic/simulated identities that do not belong to any real citizen and are created by Artificial Intelligence.

Account Takeover Fraud

Attackers attempt to bypass identity and fraud prevention controls in the authentication process by stealing user credentials, essentially passwords exposed on the dark web as a result of the countless data breaches in recent years.

How can companies prevent customer identity fraud?

Incorporating Digital Onboarding (account opening) and Biometric Authentication (passwordless access) processes into their business and operational flows).

  • Digital Onboarding mechanisms verify the real identity of a citizen who has no previous relationship with the company, by comparing their biometric facial features against the photograph of their national identity card (issued by an authorised or trusted source).
  • Biometric Authentication mechanisms corroborate that the person trying to access a digital service corresponds to a previously registered user or customer whose real identity has been verified. To do so, they validate the identity of the user by comparing the biometric features presented at the time of access against the biometric pattern registered and stored at the time of registration/onboarding.

Phases in the Digital Onboarding process

Onboarding can be broken down into two main blocks: Identity Proofing techniques and Identity Affirmation techniques.

The Identity Proofing process has the following phases or stages:

  1. Verification of the validity of the national identity document presented
    1. Through OCR (Optical Character Recognition) technology)
    1. Through NFC (Near-Field Communication) technology if the presented document and the device on which the Onboarding is performed support this technology
  2. Selfie capture and proof of life.
    1. Proof of life is about validating that the person who is Onboarding is a real person and not an impostor impersonating through stolen or synthetic identities.  It is currently the most critical factor in the whole process. There are ISO/IEC 30107 industry certifications that accredit that a supplier complies with the necessary standards to carry out this process with guarantees.
  3. Biometric verification between the selfie and the photograph of the national identity card presented.
    1. NIST (National Institute of Standards and Technology) scores the effectiveness of biometric algorithms through its “Face Recognition Vendor Test”.
  4. Manual” checking of the process by specialised agents (only for use cases where compliance with anti-money laundering regulations is required)

In addition to the Identity Proofing process, there are processes aimed at detecting fraud in Onboarding, which, as opposed to focusing on checking or validating the national identity document, carry out checks against other user data or parameters.

These techniques are known as “Identity Affirmation Tools“. Examples include:

  • Checking the user’s identity data (name, postal address, telephone number, date of birth) against official databases; census/electoral data, credit bureau or financial registers or databases. It is also possible to connect directly to state databases with the prior authorisation of the authorities (in Spain, the national police is the owner and responsible for the custody of the DNI databases).
  • Checking the user’s digital attributes; email, IP address, or social networks. For example, comparing the geolocation of the IP address against the postal address that appears on the ID card provided.
  • Checking parameters of the user’s device. The information collected about the operating system, the browser and its plug-ins, and about the hardware and its characteristics, is used to create what is known as a “Device Fingerprint“.
  • Behaviour-Analytics. Analysis of typing cadence, mouse movements, or the speed at which forms are filled in can indicate that the person behind the screen is not a real person but a robot trying to automate the process.

Onboarding and Biometric Authentication Challenges

Onboarding and Biometric Authentication mechanisms help prevent online fraud while improving the user/customer experience in their interaction with the identity and access management systems of digital platforms. Among the main challenges faced by the industry are issues related to privacy management and compliance with various data protection regulations. Biometric data are highly sensitive data that, unlike passwords, for example, which can be reset and changed as many times as you want, refer to physiological traits that are impossible to change.

Cyber Security Weekly Briefing 11 – 17 December

Telefónica Tech    17 December, 2021

New campaign distributing the Anubis banking trojan

Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app pretending to be from the French telecommunications company Orange. Malicious actors have reportedly targeted a total of 394 financial apps such as banks, cryptocurrency wallets and virtual payment platforms with the aim of exfiltrating credentials from these services. Anubis is a banking trojan that has been known since 2016 and whose development has never stopped. Once installed on the victim’s device, it works by displaying fraudulent login forms for the applications it targets in order to compromise the user’s credentials, as well as other functions such as screen and sound recording, sending and reading SMS or scanning the device for files of interest to exfiltrate. According to the investigation, the distribution of the fraudulent Orange app is reportedly carried out via malicious websites, direct messages on social networks, smishing and forum postings.

More info: https://www.bleepingcomputer.com/news/security/anubis-android-malware-returns-to-target-394-financial-apps/

Log4Shell vulnerability

Last Friday December 10, a 0-day vulnerability in Apache Log4J was reported defined as CVE-2021-44228. The vulnerability, affects the Java Apache Log4J 2 registry library, used by diverse applications of companies around the world, when dealing with an open source library. The exploitation of this flaw would allow the execution of malicious code on servers or application clients.  The risk related to this vulnerability came from different factors that were combined:

  • On day 9, the day before publishing the corrected version, an exploit was already available for this vulnerability.
  • The exploitation is simple.
  • Log4J is used worldwide in many web applications.

This vulnerability was initially corrected in Log4J 2.15.0. However, a few days later a second vulnerability was known as CVE-2021-45046, derived from an incomplete correction of the Log4Shell vulnerability and the Log4J 2.16.0 version was launched to definitively correct the vulnerabilities. Initially, this second vulnerability was cataloged as a denial of service and given a 3.7 CVSSv3, although, in the last hours, the risk has been modified to 9 and its category to remote code execution.

After the publication of this vulnerability, it has been known the presence of various exploit attempts for the vulnerability, such as the infection attempt with botnets for the installation of cryptominers, as well as its use for distributing ransomware (Khensai) or the distribution of the Trojan Stealthloader. It is important to highlight, that there is evidence of its previous exploitation on December 9, even though the mass exploitation would have led to the publication of the exploit.

Regarding the affected products, the complete list has not been defined yet. During the week, the affected products were slowly known, being the most complete list published by the Nationaal Cyber Security Centrum (NCSC-NL).

More details: https://logging.apache.org/log4j/2.x/security.html

Emotet returns to using Cobalt Strike

Security researchers warned yesterday that, after a brief pause in Emotet’s operations last week, threat actors have once again begun installing Cobalt Strike beacons on Emotet-infected devices. As reported by security researcher Joseph Roosen from the Cryptolaemus threat group, Emotet is downloading the Cobalt Strike modules directly from its Command & Control server and then executing them on infected devices. In this way, the attackers gain immediate access to the compromised networks. To do so, the threat actors use a malicious jQuery file to communicate with the C2 and receive further instructions. Despite being a malicious file, most of the code is legitimate, making it easier to evade the victim’s security systems. Due to the increase of Cobalt Strike beacons distributed to already infected computers, companies are expected to experience an increase in security incidents in the coming months.

All the details: https://www.bleepingcomputer.com/news/security/emotet-starts-dropping-cobalt-strike-again-for-faster-attacks/

New exploits for vulnerabilities already fixed by Microsoft

In the last few hours, new exploits have been detected for several vulnerabilities that were fixed in previous Microsoft bulletins: CVE-2021-42287 and CVE-2021-42278. The first of the flaws, CVE-2021-42287 CVSSv3 of 8.8 is an escalation of privilege vulnerability in Active Directory domain services, fixed by Microsoft in its security bulletin last May. This flaw, according to Microsoft itself, affects the Kerberos Privilege Attribute Certificate (PAC) and allows an attacker to impersonate domain controllers. To exploit it, a compromised domain account could have the Key Distribution Centre (KDC) create a service ticket (ST) with a higher privilege level than the compromised account. The attacker would achieve this by preventing the KDC from identifying which account holds the higher-privileged ST. If this flaw is chained with another vulnerability fixed in the November bulletin, CVE-2021-42278 CVSSv3 in 8.8, it would allow attackers to achieve domain administrator rights in any Active Directory environment. The exploit chain is extremely easy to exploit, allowing adversaries to escalate privileges even without access to the underlying standard user account. An update is available for all supported operating systems. In any case, the mitigation is to patch the affected domain controllers by implementing Microsoft’s 11/14/2021 patch (KB5008602) which fixes the CAP confusion issue, as well as the S4U2self issue created by the previous patch (KB5008380). However, some sources mention that the KB5008602 patch is only effective on Windows Server 2019 so it is recommended to consult the following guide in order to mitigate the issue on other product versions. There is currently no known active exploitation of these flaws, but we do note that there is a post explaining how this problem could be exploited, as well as a tool on Github that scans and exploits these vulnerabilities. Additionally, comments are beginning to be made on social networks about the possible combination of these flaws with the critical Log4j vulnerability.

Know more: https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html

Vulnerabilities in Lenovo devices

Security researchers at NCC Group have discovered two new vulnerabilities in the IMController component found in multiple Lenovo devices, including Yoga and ThinkPad laptops, which would affect all versions of Lenovo System Interface Foundation prior to 1.1.20.3. Lenovo System Interface Foundation is a system that runs with SYSTEM privileges and helps Lenovo devices communicate with universal applications, providing the user with functions such as system optimisation and driver updates, among others. If disabled, Lenovo applications would no longer function properly. The newly identified vulnerabilities (CVE-2021-3922 / 3969 CVSSv3 7.1) could allow a malicious user to execute commands with administrator privileges. The first one is a race condition vulnerability that would allow interacting with the secondary process “Pipe” of IMController. The second is a TOCTOU (time-of-check to time-of-use) flaw that, if exploited, could allow privilege escalation on the vulnerable device. NCC Group alerted Lenovo to both bugs last October, and finally issued updates on 14 December that fixed both bugs, so it is recommended that IMController be updated to version 1.1.20.3.

More information: https://research.nccgroup.com/2021/12/15/technical-advisory-lenovo-imcontroller-local-privilege-escalation-cve-2021-3922-cve-2021-3969/

The COVID crisis and diversity in the technology field

Sandra Tello    14 December, 2021

The pandemic has highlighted the need for STEM profiles

The coronavirus pandemic is estimated to have accelerated digitalisation by 5 to 10 years. This means that the technology sector will generate the most net employment in the coming years, but the gender gap in this sector is a reality that cannot be ignored. 

Half of European companies in the technology sector claim to have difficulties in finding the right specialised profiles for their needs. Last year, technological employment in Spain accounted for 3.8% of employment in the country as a whole, a figure that is one point below the European average. In addition, this sector is clearly male dominated, with female ICT experts accounting for only 19.8% of the total.

Girls don’t want to study STEM careers

The STEM (Science, Technology, Engineering and Mathematics) career field, unlike other sectors, remains an obstacle course for women, and this is felt by girls from an early age. It is estimated that only 30% of women in the world study STEM careers. This percentage drops to 3 per cent in information and communication technology careers or 8 % in engineering careers.

This is due to several reasons; the environment is very influential as well as having references. In addition, women working in STEM fields tend to be paid less than their male counterparts and, even more seriously, the likelihood that they will drop out of their careers is very high, estimated to be around 35% in the United States.

Multiple reports show how girls are biased, disappointed and uninterested in technology.

Diversity benefits us all: #LadyHacker

COVID-19 has had a disproportionate impact on women. But in turn, it has confirmed the strengths that women bring in terms of leadership and shown that gender diversity, in teams and in decision-making, leads to better outcomes for all. According to a recent study by McKinsey, gender equality would add $13 trillion to the global economy by 2030.

Fortunately, it is not all negative data. Children, because of COVID-19, have been able to see for themselves the relevance of technology in their family life, at school, in the media, in films and in literature. They have begun to see successful women in the field of research and science, epidemiologists and health scientists, data analysts and mathematicians. And by seeing these women rise to the top, children see the world with greater respect for all and equality.

More and more schools are making a differential commitment to include robotics and programming subjects from a very early age, which allows universal access to training in the STEM professional field and contributes to girls’ greater confidence and interest in technology.

Promoting technological vocation among girls through awareness and guidance actions given by professional women from the world of research, science and technology is precisely the objective of Telefónica Tech’s global initiative #LadyHacker. Because it is important to help girls to fulfil their dreams and to show them that there is no impossible profession. To show them that it is possible to go further and better, although there is still a long way to go.

Cyber Security Weekly Briefing 4 – 10 December

Telefónica Tech    10 December, 2021

Catalan government suffers DDoS attack

According to the statement issued by the Catalan government, the Centre de Telecomunicacions i Tecnologies de la Informació (CTTI) detected last Friday a cyber-attack that compromised more than 2,000 of the organization’s computer applications for approximately 3 hours. The attack suffered was a denial-of-service (DDoS) attack, which consists of the collapse of services by increasing the volume of traffic so that the servers increase their processing time. Regarding the origin of the attack, the Generalitat has indicated that initial investigations indicate that it could be an attack contracted through the dark web, although at the moment there is no confirmation of this. Several websites and services dependent on the Generalitat, such as La Meva Salut, were affected, and other services such as Catalan television, TV3 and Catalunya Ràdio also experienced technical problems. Eventually, within a period of no more than three hours, the situation was under control and normality was restored, as the organization itself has already assured.

More: https://govern.cat/salapremsa/notes-premsa/416324/nota

Emotet: new campaigns using Trickbot and Cobalt Strike in their infections

Researchers at CheckPoint have published an analysis of the resurgence of Emotet. According to the researchers, these new campaigns have seen the use of Trickbot as an entry vector, one of the most widely used botnets, which in recent months has infected up to 140,000 victims worldwide, with more than 200 campaigns and thousands of IP addresses on compromised devices. Trickbot, like Emotet, is commonly used to distribute ransomware, such as Ryuk or Conti. CheckPoint analyses these new campaigns where it has been observed that Trickbot is distributing Emotet. They point out that it has improved its capabilities with new tools such as: the use of elliptic curve cryptography instead of RSA, improvements in its control flow flattening methods or adding to the initial infection the use of malicious Windows application installation packages that mimic legitimate software. On the other hand, it is worth noting that Cryptolaemus researchers have reported that in some cases Emotet would be directly installing Cobalt Strike on compromised devices, which would speed up the infection process giving immediate access to lateral movement, data theft or ransomware distribution.

Learn more: https://research.checkpoint.com/2021/when-old-friends-meet-again-why-emotet-chose-trickbot-for-rebirth/

RCE vulnerability in Windows 10 and 11

Security researchers at Positive Security have discovered a remote code execution drive-by vulnerability in Windows 10 and 11. This flaw occurs through Internet Explorer 11/Edge Legacy, the default browser on most Windows devices, and is triggered through an argument injection into the Windows default handler URI ms-officececmd. An attacker could exploit this vulnerability via a malicious website that allows a redirect to a URI created by ms-officecmd. It should be noted that Microsoft Teams must be installed on the system for the exploit to work. Following Positive Security’s report of the flaw in March, Microsoft initially dismissed it and upon appeal by the researchers, classified it as critical. In August, Microsoft partially fixed the bug, still allowing argument injection.

All the info: https://positive.security/blog/ms-officecmd-rce

0-day vulnerability in Apache Log4j

A PoC has been published for a 0-day vulnerability, recently assigned as CVE-2021-44228, for code execution in Apache Log4j, an open-source library developed in Java that allows software developers to save and write log messages that is used in multiple applications by companies around the world. This flaw would allow malicious code to be executed on application servers or clients, one of the most prominent being those running Java versions of the Minecraft video game, manipulating log messages and even messages entered the game’s own chat. According to LunaSec researchers, Java versions higher than 6u211, 7u201, 8u191 and 11.0.1 are not affected by this attack vector. Furthermore, LunaSec indicates that Steam and Apple iCloud cloud services have also been affected. Lastly, it should be noted that the versions of apache log4j affected are 2.0 to 2.14.1, with this security flaw being corrected in version 2.15.0.

All the details: https://www.lunasec.io/docs/blog/log4j-zero-day/

Analysis of Russian state actor Nobelium

Researchers at Mandiant have published an article detailing operations carried out by Nobelium, an actor associated with the Russian Foreign Intelligence Service (SVR). Mandiant reports that the tactics employed by the group to gain initial access to the victim’s infrastructure include: the use of credentials compromised in previous malware campaigns where the CRYPTBOT stealer was used, compromise of cloud service providers (CSPs) and abuse of push notifications (MFA). Once the first access is gained, the actor attempts to gain persistence and escalate privileges by using the RDP protocol, employing WMI and PowerShell to distribute the BEACON backdoor on the victim’s network. This backdoor was later used to install a new tool they have named CEELOADER, a downloader that communicates via HTTP with Nobelium’s C2, and which distributes Cobalt Strike. In addition, Mandiant highlights the use of residential IP proxy services to authenticate themselves in the victim’s systems and the use of compromised WordPress where they host the payloads that will lead to the second stage of the infection chain. Likewise, the French National Cybersecurity Agency (ANSSI) has issued a statement specifying that since last February multiple campaigns against French organizations originating from the Russian actor have been detected.

Más info: https://www.mandiant.com/resources/russian-targeting-gov-business