Cybersecurity Weekly Briefing 29 August-4 September

ElevenPaths    4 September, 2020

Red Dawn, new attached document from Emotet

The use of a new attached document template by Emotet has been identified over the past week. The name given by security researcher Joseph Roosen to this malicious Word file (.doc) attached to spam campaign emails is Red Dawn. When opened, it is indicated that the document “is protected” and the preview is therefore not available, so it is necessary to “enable editing” and “enable content” in order to view it. If the victim follows these steps, malicious macros that download and install the Emotet malware on the system will be executed. Previously this summer, Emotet has been making use of a similar template in which it indicated that the document had been created in iOS, thus being necessary to “enable editing” and “enable content” in order to view it. It is important to note the importance of detecting these emails from Emotet since it is the gateway to Trojans such as TrickBot and QBot, and these, in turn, to ransomware such as Conti or ProLock.

More: https://www.bleepingcomputer.com/news/security/emotet-malwares-new-red-dawn-attachment-is-just-as-dangerous/

Vulnerability in EMV, bank card communication protocol

Researchers have discovered techniques to bypass PIN-code authentication in contactless Visa bank card transactions. This is an EMV protocol flaw, specifically in the bank card verification method, which lacks cryptographic protection and allows a threat agent to carry out a Man-In-The-Middle (MITM) attack. Researchers have allegedly proved that the PIN can be bypassed in the payment process due to the fact that the device does not require entering the code as it believes the consumer has authenticated. To do so, they used a proof of concept based on an Android application called Tamarin . The proof of concept, carried out in shops and other establishments, was successful in evading the PIN on Visa Credit, Visa Electron and VPay cards.

More info: https://arxiv.org/pdf/2006.08249.pdf

Epic Manchego: obfuscation in maldoc delivery

NVISO researchers have revealed new techniques for obfuscation of maldocs that elude detection by some surveillance systems. These are malicious Excel documents that disseminate malware through VBA code, which are created without the use of Microsoft Office. An analysis by researchers has disclosed the use of tools such as EPPlus, software used for producing documents with a .NET library that creates Office Open XML (OOXML) worksheets. This technique provides files with uncompiled VBA code, a feature that can be achieved only by Office, which is delivered in plain text without encryption, but protected by a password that does not need to be entered for the macros to be executed. Once the macros have been enabled and their process completed, a payload is obtained that initiates a second phase of infection, identify by security venders as Tesla Agent. After the dynamic loading of a DLL, as a third phase of the attack, an infostealer is downloaded to exfiltrate sensitive data from the victim’s computer.

More: https://blog.nviso.eu/2020/09/01/epic-manchego-atypical-maldoc-delivery-brings-flurry-of-infostealers/

European ISPs suffer DDoS attacks

More than a dozen Internet Service Providers (ISPs) in Europe have reported DDoS attacks targeting their DNS infrastructure. The list of ISPs that were attacked during the last week includes Belgian operator Edpnet, France’s Bouygues Telecom, FDN, K-net, SFR and the Dutch Caiway, Delta, FreedomNet, Online.nl, Signet and Tweak.nl. The attacks did not last more than a day and all were eventually mitigated, but ISP services were down while the DDoS was active. NBIP, a non-profit organization founded by Dutch ISPs to collectively combat DDoS attacks and the Government´s telephone tapping attempts, has provided additional information on last week’s incidents indicating that “several attacks were directed at routers and DNS infrastructure of Benelux based ISPs”. Moreover, NBIP addresses that “most of the attacks were DNS amplification and LDAP type attacks”. “Some of the attacks took more than 4 hours and reached a volume close to 300 Gbit/s”.

More: https://www.zdnet.com/article/european-isps-report-mysterious-wave-of-ddos-attacks/

What is Tank Telemetry?

Beatriz Sanz Baños    31 August, 2020

Tank Telemetry is a wireless system for controlling liquid container data in remote unstaffed areas where it is too difficult or expensive to connect data lines.

A typical Tank Telemetry solution offers m2m cellular connectivity linking sensors installed in industrial vessels to measure content properties such as volume or temperature with a data backend that collects and displays data.

The main potential clients for this market are fuel, chemical, lubricant, propane or water treatment companies. The goal for tank telemetry is to save money, time and logistics to companies through a monitored system that collect metrics and keep companies informed about their tanks 24 hours a day, seven days a week.

So how does tank telemetry work?

Many solutions are almost plug and play add-ons requiring very little help to have them installed and operating in a matter of minutes. To set up a sensor (which normally works through ultrasound) we need to provide some information about the tank where the sensor is installed such as tank sidewall height, diameter, maximum capacity, and the level of the vessel when the sensor is installed.

The physical interface to connect a sensor to the tank is called the process control which is a bolt shaped opening with a gasket. The sensor seals the process control opening by screwing in.

Once installed the initial reading is performed based on the required parameters explained before connecting via a cellular connection when available. Solar or battery powered sensors (depending on their location) can relay information both in real time and in a scheduled manner.

If the sensor relies on a limited energy source it will also send alerts when battery is running low to have them replaced.

The solution relies on two ends that seamlessly connect. The vessel sensors relay varied information such as:

  • Basic Asset Tracking data
  • Location
  • Consumption monitoring and analysis
  • Tank level information for efficient route planning if refilling is required
  • Tank efficiency reports
  • Access to tank information 24/7.
  • Alerts and notifications (empty/full, temperature, etc.)
  • Real time accurate values for capacity and temperature

Building a case for tank telemetry is relatively easy as it impacts productivity optimization and cost savings in several ways avoiding unnecessary trips to fill tanks that have enough contents, avoiding costly run-outs that impact service, receiving immediate alerts when levels of liquid or batteries run below a certain threshold.

A well planned tank telemetry solution will offer a rapid return of investment as it allows for drastic cut- downs in terms of delivery miles and service downtime. Machinery breakdowns, leakages, theft, run-outs and safety breaches are quickly detected and handled.

Cybersecurity Weekly Briefing August 22-28

ElevenPaths    28 August, 2020

Conti ransomware distributed after Trickbot

Conti is a relatively new ransomware that appeared in isolated attacks in December 2019 but started to become a relevant threat in June 2020, when it increased its attacks against corporate targets. This ransomware follows the Ransomware-as-a-Service bussiness model that recruits experienced hackers as affiliates to distribute the payloads in exchange for a large share of the ransom payment.

In addition, Conti adheres to two main trends in ransomware these days, human-operated campaigns and extortion of the victims by leaking sensitive stolen data (there are currently 26 companies listed in Conti website in the Dark Web). Now, Conti has adapted the distribution methods once used by Ryuk ransomware -whose activity began to decline until it completely disappeared in July- and has become the final payload distributed in malware infections carried out by Trickbot.

More information: https://www.bleepingcomputer.com/news/security/ryuk-successor-conti-ransomware-releases-data-leak-site/

New Grandoreiro and Mekotio Trojan campaigns in Spain

In recent days, several e-mail campaigns have been detected in Spain distributing banking Trojans of Brazilian origin, Grandoreiro and Mekotio. On the one hand, Grandoreiro is making use of the same email template already used in previous campaigns, in which it impersonates the Spanish Tax Office in order for the victim to download a file hosted on recently created domains. In addition, this malware is also supplanting the telecom company Vodafone in this campaign.

As for the Mekotio Trojan, it should be noted that it is also supplanting the Spanish Tax Agency, as well as the Spanish Ministry of Labor, with the malware download link pointing to an address hosted in the Microsoft Azure cloud. This focus on Spain is an indicator of the success that the campaigns are achieving in Spain, therefore, it is recommended to check the e-mails received, not to open files or access links, and always use the official website of the company or organization that has been supplanted.

Full news: https://blogs.protegerse.com/2020/08/25/oleadas-de-correos-propagan-los-troyanos-bancarios-grandoreiro-y-mekotio-en-espana/

SunCrypt new member of the Maze cartel

SunCrypt is the latest malware to join the ransomware cartel formed by Maze, LockBit and Ragnar Locker. According to SunCrypt’s operators, they joined the cartel since Maze “can’t handle all the available field of operations”. In this way Maze would be sharing its infrastructure in exchange for a shared revenue for each ransom payment.

As for SunCrypt ransomware, it is known to have begun operating in October 2019, and is distributed as a DLL. When executed, it encrypts the system files by adding a hexadecimal hash to the end of each file, and creating a rescue note that contains a link to the Tor payment site, as well as to the SunCrypt data leak website. It is noteworthy that when the ransomware is executed, it connects to an IP address to transmit information about the victim and the attack, which is one of the IPs frequently used by Maze in its operations.

More details: https://www.bleepingcomputer.com/news/security/suncrypt-ransomware-sheds-light-on-the-maze-ransomware-cartel

New Qbot Campaign To Steal Mail Threads

Check Point researchers have published a report claiming that the Qbot Trojan, also known as QakBot, is stealing email threads again for future use in phishing campaigns and malware distribution. Qbot is a banking Trojan that has been infecting victims and exfiltrating passwords, cookies, credit cards, banking credentials and mails from their computers for over 10 years.

Stolen threads are used for phishing and malspam campaigns, which are very effective as they are more likely when malicious mails are included in the conversation of an existing thread. Researchers highlight one of the features added to Qbot, which is the ability to assemble malware from two separate halves, thus avoiding detection when it is downloaded onto the victim computer.

More information: https://research.checkpoint.com/2020/exploring-qbots-latest-attack-methods/

SASE: The Future of Networks and Security Is Now Here

ElevenPaths    27 August, 2020

Since Gartner published their report entitled “The Future of Security Networks is in the Cloud” in August 2019, which pointed out the concept of SASE as the key to the future of networks and security, there has been a constant and growing buzz around it. But despite everything that has been written since then, we still hear frequent questions such as: What is SASE really? Or, where can I buy it?

The truth is that SASE is not a product or service that one can acquire directly from a provider, but a new model for delivering network and security services. It represents a relevant evolution of trends that have emerged in recent years, such as ‘Security as a Service’ or ‘Network as a Service’. SASE is also intended to cover a huge range of scenarios, technologies and network and security services, so it is not surprising that there is some confusion around this concept.

Below, we will try to clarify the problems that led to the appearance of SASE, describe the model and the benefits for the customer and explain what the keys are to adopting it.


Full paper

Cybersecurity Weekly Briefing August 15-21

ElevenPaths    21 August, 2020

EmoCrash: stopping Emotet for almost 6 months

Emotet’s comeback after a 6 month-period absence has hinted that the hiatus in the malware’s operations could be due to the discovery of researcher and malware analyst James Quinn, who detected a flaw in Emotet’s software in early February. According to Quinn, he spotted slight changes in the persistence mechanisms used by Emotet, mainly in the creation of a Windows registry key in which a XOR cipher key was saved.

This discovery, among other flaws, led Quinn to develop a PowerShell script “vaccine” that leads to a buffer overflow in the registry key, causing the malware to crash and thus, being known as EmoCrash. During the past 6 months, EmoCrash was secretly distributed to CERTs up until Emotet’s developers changed again the persistence mechanism and started a new malicious campaign on the first days of August.

More information: https://www.binarydefense.com/emocrash-exploiting-a-vulnerability-in-emotet-malware-for-defense/

PoC for RCE vulnerability in Apache Struts 2

Security researchers have released a proof of concept that can be used to exploit the remote code execution vulnerability (CVE-2019-0230) in Apache Struts 2, released on Thursday, August 13. This problem is due to an error in the evaluation of the attributes of the tags when using non-validated inputs that allow injecting malicious OGNL expressions. Some versions of Struts incorporate controls to mitigate these attacks, but only after version 2.5.22.

The vulnerability can be mitigated with proper validation of user input or if the syntax for writable user input is not used. Although the target of the published PoC is the CVE-2019-0230 vulnerability, Apache recommends also mitigating the CVE-2019-0233 bug, which would allow DoS attacks to be carried out on the vulnerable server.

More details: https://github.com/PrinceFPF/CVE-2019-0230/blob/master/CVE-2019-0230.sh

Critical Jenkins Server Vulnerability

Developers Jenkins, a popular open-source automation server software, published an advisory on Monday concerning a critical vulnerability in the Jetty web server that could result in memory corruption and cause confidential information to be disclosed. Tracked as CVE-2019-17638, the flaw has a CVSS3.1 rating of 9.4 and impacts Eclipse Jetty versions 9.4.27.v20200227 to 9.4.29.v20200521—a full-featured tool that provides a Java HTTP server and web container for use in software frameworks.

According to the company, the vulnerability may allow unauthenticated attackers to obtain HTTP response headers that may include sensitive data intended for another user. After the security implications were disclosed, the vulnerability was addressed in Jetty 9.4.30.v20200611, released last month. Jenkins, which bundles Jetty via a command-line interface called Winstone, has patched the flaw in its utility in Jenkins 2.243 and Jenkins LTS 2.235.5 released on Monday. It’s recommended that Jenkins users update their software to the latest version to mitigate the buffer corruption flaw.

Full news: https://www.jenkins.io/security/advisory/2020-08-17/

Software glitch in ATMs

In recent days, more than 50 suspects have been arrested on charges of cashing-out Santander ATMs by using a software glitch. These acts of theft have been perpetrated in several cities of the United States, where several groups of criminals used fake debit cards or valid preloaded debit cards to withdraw more funds from ATMs than the cards were storing. Initially this software glitch remained a secret, although it ended up being shared on several social networks, which led to the exploitation of the glitch by more criminal groups, causing a sudden spike in ATM cash withdrawals, which triggered alarms and an investigation.

On Tuesday, all ATMs were closed to prevent further robberies, and as of yesterday they were open only for bank customers for the time being. The bank has verified that its clients’ accounts have not been affected, and that the bug has been fixed. After knowing the issue, the two major ATM manufacturers, Diebold Nixdorf and NCR, have released software updates to correct these bugs. On the one hand, Diebold Nixdorf patched CVE-2020-9062, an issue impacting ProCash 2100xe USB ATMs running Wincor Probase software; on the other hand, NCR patched CVE-2020-10124, a bug in SelfServ ATMs running APTRA XFS software.

Both vulnerabilities allowed an attacker to intercept and modify messages regarding the amount of money or value of currency deposited, since ATMs do not encrypt or authenticate the integrity of messages between the ATM and the host computer. Therefore, in a two-step process, an attacker could deposit a sum of money, modifying the messages as to the amount of money or the value of the currency, and then proceed to withdraw the money with the value or amount entered in the message. Both companies have already implemented software updates to protect communications between the ATM and the host computer.

More information: https://www.zdnet.com/article/tens-of-suspects-arrested-for-cashing-out-santander-atms-using-software-glitch/

ElevenPaths Presents DIARIO, the Malware Detector That Respects Users’ Privacy

ElevenPaths    18 August, 2020
  • The tool statically scans and analyses documents without the need to identify the content of the files, thus respecting and guaranteeing their privacy.
  • DIARIO is a new concept of malware detection that uses machine learning, training the algorithms with whatever evades the antivirus so as to complement them and thereby strengthen system security.

ElevenPaths, the cybersecurity company part of Telefónica Tech, has created DIARIO, a new concept of malware detection that scans Office 365 and PDF documents without the need for the scanning engine to access or process the content. The tool, developed by the ElevenPaths’ Innovation Lab team, extracts certain functionalities from the files (never the content) and sends them to the server, which rapidly detects and guarantees the privacy of the content, whether the document contains any kind of malware or not. 

DIARIO incorporates a kind of artificial intelligence that’s been specifically trained to detect malware that generally evades traditional antivirus solutions and, for this purpose, it performs a document analysis procedure without the need to access the content of the documents, a fundamental feature in the event that the files have indeed private or sensitive information.

Unlike other machine learning-based solutions for detecting malware, DIARIO is characterised by the following:

  • It respects privacy: it’s been designed to specialise in documents whose privacy it’s necessary to safeguard: PDF and Office 365.
  • It’s intelligent: its learning model has been trained with malicious indications that are harder for traditional antiviruses to recognise, in order to cover a gap that these solutions aren’t able to fill. It’s therefore not designed to replace antiviruses but rather to complement them by acting within a space that endpoint solutions cannot reach.
  • The analyst panel: developed to enable cybersecurity analysts to validate and reinforce their analysis protocol and study in a convenient and assisted manner. It’s geared towards two profiles of users: those who want to use the prediction service without compromising the document data and analysts who can benefit from the database of detected threats without having access to any private data in the documents.

“On many occasions we receive an email with a document supposedly containing a file attachment with confidential information that comes from a legitimate and known source and which, despite having passed through the mail’s antivirus filter, may contain some type of malware. In these cases, using DIARIO allows us to add an additional layer of security to the gateway antivirus that has failed, without jeopardising the content of the document in the event that it’s actually confidential”, explains Sergio de los Santos, director of the ElevenPaths´ Innovation Lab.

DIARIO, which is currently used on an internal basis by Telefónica, is free and can be used directly on its official website or downloaded and installed on a computer. As it’s a collaborative tool, the more users have it the better, because all their knowledge is shared and the formula can continue to be improved and extended to other kinds of files.


Full press release

Cybersecurity Weekly Briefing August 8-14

ElevenPaths    14 August, 2020

Hackers attempt to exploit critical vulnerability in F5 BIG-IP ADC

The FBI has issued a Private Industry Notification warning that a group of Iranian hackers have been trying to exploit Big-IP ADC devices vulnerable to the remote code execution security flaw without CVE-2020-5902 authentication (CVSSv3 of 9.8), since early July 2020. The attacks were reportedly directed at US organisations from a wide range of sectors.

The FBI also warned private industry organisations that once their networks get compromised by the hackers, patching devices will be an insufficient mitigation technique, since they also use web shells to create persistent backdoors as well as stolen credentials to regain access. After gaining access to the network, hackers would use tools such as Mimikatz or NMAP to conduct an examination of the internal network and add new users to the systems.

Last month, CISA (Cybersecurity and Infrastructure Security Agency) also issued a warning confirming the active exploitation of this vulnerability and the involvement of two compromised organisations through the exploitation of this flaw. On the other hand, these same actors would also be linked to multiple campaigns against vulnerable VPN services since August 2019, taking advantage of security flaws in Pulse Secure (CVE 2019-11510, CVE 2019-11539) and Citrix ADC/Gateway (CVE 2019-19781).

Full news: https://www.bleepingcomputer.com/news/security/fbi-iranian-hackers-trying-to-exploit-critical-f5-big-ip-flaw/

Bypass for 0-Day vulnerability in vBulletin

Security researcher Amir Etemadieh has posted a bypass for a patch that corrects a 0-Day vulnerability in vBulletin. This is one of the most used software forums today. In September 2019, the existence of a 0-Day vulnerability was detected, with identifier CVE-2019-16759 with a CVSS of 9.8. The error allowed attackers to exploit a bug in the vBulletin template system to execute malicious code and take over forums without authenticating to victims’ sites. The details and the exploit code are both available on the Etemadieh blog, along with three PoCs in Bash, Python and Ruby. A few hours after the information was known, the Def Con forum became victim to this attack.

More details: https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/

Microsoft fixes 120 vulnerabilities

Microsoft has released its updates for August 2020. This time, the company has patched 120 vulnerabilities that affect 13 different products. Among the 120 vulnerabilities, 17 flaws were rated ‘Critical’. Two of these critical features correspond to two 0-Days for which the detection of previous exploitation by threat agents is confirmed.

  • CVE-2020-1380: This is a scripting engine memory corruption vulnerability affecting Internet Explorer, allowing threat agents to remotely execute code.
  • CVE-2020-1464: This is a Windows Spoofing Vulnerability that allows malicious actors to spoof by allowing an executable to de digitally signed. This would allow them to bypass security features intended to prevent improperly signed files from being loaded.

In addition to the two 0-Days that were actively exploited, one of the critical vulnerabilities should be highlighted: CVE-2020-1472, which is an elevation of privilege vulnerability in the NetLogon component. Some security researchers emphasise the need to patch this vulnerability, for which a change in the service will take place next February 2021.

More information: https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Aug

Adobe fixes critical code execution bugs in Adobe Acrobat, Reader and Lightroom

Adobe has released security updates that address a total of twenty-six vulnerabilities, eleven of which are classified as ‘Critical’ since they allow attackers to bypass security features or perform remote code execution on vulnerable computers.

  • Adobe Acrobat and Reader: 25 vulnerabilities have been fixed, eleven of which are ‘Critical’ since they would allow remote code execution of bypass security functions.
  • Adobe Lightroom: a DLL hijacking vulnerability has been fixed that would allow an attacker to execute commands with elevated privileges.

All the details here: https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/

Development of Mekotio malware

The ESET team of researchers have recently published a report about the development of the Mekotio banking trojan; malicious software used mainly against several LATAM countries like Brazil, Chile or Mexico, and European countries like Spain or Portugal. Among its capabilities it is worth mentioning the collection of confidential information from the victims’ hosts, firewall configurations, operating system information, user privileges and the status of the installed security tools.

Mekotio also has several other functions, including the ability to function as a backdoor, take screenshots, manipulate pop-ups or simulate mouse and keyboard actions. Some variants can also steal bitcoins by replacing a bitcoin wallet in the clipboard and to exfiltrate credentials stored by the Google Chrome browser. The main distribution method for Mekotio appears to be through spam campaigns, in which the victim is asked to download a file that simulates an invoice. Communication with the C&C server is based on a network protocol in Delphi_Remote_Access_PC.

When that is not the case, Mekotio uses a SQL database as a sort of C&C server in which it calls specific SQL procedures stored on the server side and which are encrypted. ESET indicates that there are multiple variants of this malware in development, so it is expected that it will keep infecting new victims in the future.

More information: https://www.welivesecurity.com/2020/08/13/mekotio-these-arent-the-security-updates-youre-looking-for/

ElevenPaths Expands Its Cloud Security Solutions Portfolio With Prisma Cloud By Palo Alto Networks

ElevenPaths    12 August, 2020
  • ElevenPaths has achieved the status of Premier Public Cloud MSSP Partner with Palo Alto Networks.

ElevenPaths, Telefónica Tech’s Cybersecurity Company, has expanded its Cloud Managed Security Service (Cloud MSS) by incorporating Palo Alto Networks® Prisma™ Cloud technology into its offering which covers public cloud environments, such as AWS®, Azure® and GCP™ whose services are also provided through Telefónica Tech’s cloud unit. Cloud MSS provides clients with a comprehensive cloud native security service for a secure cloud adoption experience, offering security teams real-time asset visibility and protection, continuous security posture monitoring, and incident response. As a recognized Prisma Cloud Managed Security Service Provider Partner (Prisma MSSP) with demonstrated technical proficiency and proven experience, ElevenPaths is a natural cloud security partner to deliver and manage successful Cloud MSS implementations based on Prisma Cloud and to ensure the protection of clients’ workloads and data across AWS, Azure and GCP.

Prisma Cloud by Palo Alto Networks is a comprehensive Cloud Native Security Platform (CNSP) offering organizations the security and compliance coverage they need across their entire cloud technology stack, applications and data. It enables security operations and DevOps teams to stay agile, collaborate effectively and accelerate cloud native application development and deployment securely.

ElevenPaths Cloud MSS leverages Prisma Cloud through our skilled and certified i-SOC cloud security team in Europe and Latin America delivering leading protection, detection and response capabilities for customers around the world. The service assesses customers’ cloud environments in real time against customer-adapted rulesets, based on Prisma Cloud’s built-in security ruleset templates and ElevenPaths’ proprietary ruleset, to identify potential risks and prevent security incidents. Continuous security event monitoring is supervised by managed operations to continually assess their overall cloud security posture and respond to both live threats and security events. Prisma Cloud is part of the core service, offering continuous native cloud security and compliance posture management for multi-cloud environments.

The Cloud paradigm brings new security challenges throughout the cloud adoption journey: applying comprehensive security to maintain an adequate security posture in a rapidly changing environment or being able to include security in the DevOps pipeline to deliver secure infrastructure and workloads. ElevenPaths Cloud Security offering includes professional and managed services and capabilities to help customers overcome those challenges. Cloud MSS concentrates its efforts through operations and response to unknown threats to help customers implement effective, replicable and auditable Cloud Security.

“Since you can’t secure what you can’t see, prevention and detection of risks becomes a challenge,”said Alberto Sempere, Director of Product and go to market at ElevenPaths. “With ElevenPaths’ Cloud MSS powered by Prisma Cloud our customers’ IT and security teams can spend less time testing and evaluating their environment and more time evolving their business. This service helps customers better assess, understand, and automate their cloud security posture.”

“Organizations are increasingly turning to managed service providers to help them contend with today’s complex public cloud threat landscape, technical talent shortages, and dynamic business conditions – all while keeping security costs under control,” said Alex Zinin, VP, Worldwide Service Provider Business, Palo Alto Networks. “We’re proud to be working with ElevenPaths across both EMEA and Latin America to bring the power of Prisma Cloud to organizations around the world, helping to make each day more secure than the one before.”

Cybersecurity is one of the recently integrated digital services offered by Telefónica, together with the cloud and IoT/Big Data, in Telefónica Tech, a new unit that brings together these three businesses with a high growth potential and with which it seeks to accompany its customers in their digital transformation.


Full press release

Cybersecurity Weekly Briefing August 1-7

ElevenPaths    7 August, 2020

Database of +900 Pulse Secure VPN Enterprise Servers

An underground forum post has been detected showing the existence of a database containing data collected on more than 900 Pulse Secure VPN enterprise servers. Zdnet.com has managed to obtain and analyze the data, which includes: IP addresses of Pulse Secure VPN servers, firmware version and ssh keys of the servers, list of users and password hashes, among others. The information appears to have been obtained between June 24 and July 8, 2020.

From Bank Security’s Twitter account they have said that, after analyzing the data obtained, all Pulse Secure VPN servers included in the list were running a firmware version vulnerable to the CVE-2019-11510 vulnerability. Due to this, it is estimated that the threat actor who compiled this information could have used an exploit for this vulnerability and, once it has gained access to these systems, it has extracted all the information to create this repository.

https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/

Remote code execution in Microsoft Teams

Trustwave researcher Reegun Jayapaul has published an analysis of Microsoft Teams in which he claims that the application would be vulnerable to remote code execution attacks. The increased use of video conferencing applications as an aid to teleworking during the health crisis has led threat agents to focus on this type of tool and in this respect, Microsoft Teams has been one of the resources most widely used.

In 2019, this software published a patch that prevented an attacker from using the high volume of updates to include malicious payloads, given the ability to update via a URL. However, as the researcher points out, this was not a complete solution as local connections are allowed via a shared resource. The proof of concept to demonstrate this fact is to use a remote SMB share, creating a Samba server with public remote access and naming the malicious payload “Squirrel”, the Teams installation and update manager. To mitigate this threat, it is recommended to scan executables Squirrel.exe and investigate possible outgoing SMB connections.

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-teams-updater-living-off-the-land/

New vulnerability in TeamViewer

Security researcher Jeffrey Hofmann has discovered a new vulnerability in the Windows TeamViewer platform that has been listed as CVE-2020-13699 with CVSS v3 score of 8.8. TeamViewer is a tool used for remotely connecting both computers and mobile devices. The vulnerability discovered entails that vulnerable versions of TeamViewer do not correctly execute URI drivers, which could lead threat agents to exploit this flaw by including a malicious iframe in a web domain specifically created for an attack.

This vulnerability can be exploited remotely, and no prior authentication is required. Therefore, it makes possible attacks known as “watering hole”. So far, there is no evidence that this vulnerability is being exploited, nor that any exploit is available. The company has released a new update, which they recommend applying (15.8.3) to correct this security flaw that affects previous versions of TeamViewer.

https://community.teamviewer.com/t5/Announcements/Statement-on-CVE-2020-13699/m-p/99129

New Timing Attack Techniques

A group of researchers has discovered a new technique for timing-based side-channel attacks that makes them more effective. This type of attack is mainly based on variations in network transmission time, which depends on the load of the network connection. The new technique, called TTA (Timeless Timing Attacks) leverages multiplexing of network protocols and concurrent execution by applications to analyze the order of responses and no longer rely on synchronization, and therefore, on network transmission time. This is allowed only for those protocols with HTTP/2, including web services that support HTTPS.

Additionally, researchers claim that this new method could be deployed against Tor services, using this technique also in HTTP/1.1 web services and allowing a threat actor to create two connections to a node on this network and send simultaneous requests on each of the connections to measure the time difference.

https://thehackernews.com/2020/07/http2-timing-side-channel-attacks.html

20GB of Intel internal documents get leaked

Technology company Intel is investigating a security breach after a total of 20GB of its internal documents were posted on MEGA site. The company has confirmed the authenticity of the documents, some of them classified as “restricted” or “confidential”. It should be noted however, that none of these documents contained confidential customer or employee data. The person responsible for the theft sent these files to Till Kottmann, the head of a Telegram channel that publishes accidentally leaked data from technology companies, who uploaded part of these files to MEGA.

For the time being, Intel suspects that the theft was committed by an individual with access to their Design and Resource Center which provides non-public technical documents to Intel business partners and was not the result of an unauthorized access. However, the perpetrator of the theft told Till Kottmann that this data was obtained through access to an unsecured server hosted on Akamai’s CDN.

https://www.zdnet.com/google-amp/article/intel-investigating-breach-after-20gb-of-internal-documents-leak-online/

Enjoy Connected Beer

Beatriz Sanz Baños    7 August, 2020

Going out to grab a beer we could say is a tradition now in Spain. Spaniards consume more than 3,500 million liters per year. What you may not know is that the beer you consume could be made thanks to the Internet of Things. And no, the connected beer is not the one that appears on Instagram. Thanks to connectivity, we can enjoy a better brewed, better distributed beverage and consume it in a more personalized way.

Discover the beer of the future in this infographic

To keep up to date with Telefónica’s Internet of Things area, visit our web site or follow us on TwitterLinkedIn YouTube.