Transcript
Sean Kelly (0:00)
From the CISO series, it's Cybersecurity Headlines these are the cybersecurity headlines for Wednesday, December 11, 2024. I'm Sean Kelly. U.S. senator announces new bill to secure telecom Companies On Tuesday, Senator Ron Wyden announced a new draft bill that aims to secure US Communication networks in response to a recent rash of hacks allegedly carried out by Chinese government hackers. The Secure American Communications act would order the FCC to issue binding cybersecurity rules to telecom carriers. These rules include testing systems annually for security vulnerabilities and documenting findings and corrective measures. Telecoms will also have to contract for independent annual compliance audits, while telecom CEOs and CISOs will need to attest to their compliance with the new rules. Google unveils new Quantum chips On Monday, Google announced its most powerful quantum computing chip to date, dubbed Willow. In under five minutes, Willow performed a computation that would take one of Today's fastest supercomputers ten septillion years written out. That's one with 25 zeroes after it. Unlike classic digital computers that calculate based on whether a bit is 0 or 1 on or off, quantum computers rely on incredibly tiny qubits. Qubits can be on or off, but also somewhere in between. While qubits offer more computational power, they are also more prone to error, giving rise to skepticism that quantum computers will ever live up to their hype. Google's mission with Willow was to reduce qubit error rates, and according to Google's Quantum AI founder Hartmut Navin, its new chip achieves that US Sanctions Chinese cybersecurity firm for firewall hacks On Tuesday, the DOJ unsealed an indictment against Chinese cybersecurity company Sichuan Silence and one employee for involvement in a major hacking campaign. Sichuan Silence employee Guan Tianfeng discovered a zero day SQL injection vulnerability in Sophos XG firewalls. Guan used the exploit to compromise more than 81,000 sophos firewalls worldwide, over a quarter of which belonged to US Government and critical infrastructure organizations. Guan stole data and attempted to infect victim systems with a Ragnarok ransomware variant. The U.S. state Department announced up to a $10 million reward for information about Sichuan Silence, or Guan, through its Rewards for Justice. Patched file transfer products being Exploited Security researchers at Huntress are warning that vulnerabilities in several file transfer products from Clio are under active exploitation. Clio recently patched a vulnerability that affects the company's Lexicom VL transfer and Harmony products. However, the researchers warned that even fully patched systems are still exploitable. Huntress advised customers to move any Internet exposed Clio systems behind a firewall until a new patch is released. Clio confirmed the issue and provided customers with immediate steps to mitigate the issue while they continued to develop a new patch. And now we'd like to thank Today's episode sponsor ThreatLocker do zero day exploits and supply chain attacks keep you up at night? Worry no more. You can harden your security with Threat Locker. Threat Locker helps you take a proactive default deny approach to cybersecurity and provides a full audit of every action allowed or blocked for risk management and compliance. Onboarding and operation are fully supported by their US based support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit threatlocker.com that's T H R E A T L O c k e r.com PluginBug allows Stripe refunds on millions of WordPress sites a high severity authentication vulnerability has been discovered in the WPForms WordPress plugin used in over 6 million websites. WPForms is an easy to use drag and drop form builder for creating contact feedback, subscription and payment forms, and offers support for Stripe, PayPal and Square. The consequences of exploitation could allow subscriber level users to issue arbitrary Stripe refunds or cancel subscriptions. For site owners, this could mean loss of revenue, business disruption and trust issues with their customer base. A patch was released on November 18th for version 1.9.2 of the plugin, but according to WordPress.org stats, roughly 3 million sites remain on older vulnerable plugin versions. And now it's time for you should probably patch that patch Tuesday Edition Yesterday, Microsoft released its December 2024 Patch Tuesday security fixes, which addressed a total of 71 flaws, 57 of which allow for remote code execution or privilege escalation. The most severe is a 9.8 severity bug in LDAP or Lightweight Directory Access Protocol, but Microsoft notes that it's difficult to exploit One moderate flaw in the common log file system driver is under Active exploit and allows attackers to gain system privileges on Windows devices. Meanwhile, Adobe issued its own swath of patches yesterday, addressing more than 160 vulnerabilities across 16 products. More than a dozen of the issues relate to Adobe Animate, and all of those issues are rated critical and can lead to arbitrary code execution. 22 of the vulns affect Adobe Connect, including several rated critical and high, and can also be exploited for arbitrary code execution and privilege escalation. A whopping 90 of the issues were an Adobe Experience Manager. However, only one has a critical severity. Adobe says it's not aware of any in the wild exploits for the vulnerabilities. And finally yesterday, Avanti warned customers about a new maximum severity authentication bypass vulnerability in its cloud services appliance solution. Ivanti is not aware of active exploitation of the flaw, but advises admins to upgrade vulnerable appliances. Avanti also patched other medium high and critical vulnerabilities in desktop and server management, Connect Secure and Policy Secure, Sentry and Patch SDK products. Hackers exploit AWS misconfigurations in massive data breach Independent cybersecurity researchers Noam Rotem and Ran Lokar uncovered a significant cyber operation exploiting vulnerabilities in public websites hosted on Amazon Web Services. Researchers linked the campaign to the Nemesis and Shiny Hunters, hacking groups who used tools like show to scan AWS public IP ranges for application vulnerabilities and misconfigurations. They then scanned exposed endpoints for sensitive data, including credentials for popular platforms like GitHub, Twilio and crypto exchanges. Verified credentials were later marketed on Telegram for hundreds of euros per breach. The researchers and AWS advised customers to avoid use of hard coded credentials, periodically rotate keys and secrets, deploy web application firewalls, and to use canary tokens as tripwires for sensitive info. CP30 pleads guilty to multimillion dollar crypto mining scheme 45 year old Charles O. Parks III, known online as CP3O, pleaded guilty to wire fraud charges in a federal court in Brooklyn, New York. Over a period of eight months in 2021, Parks created Cloud accounts using fake identities and company names. Parks used the accounts to mine Ethereum, Litecoin and Monero while ignoring payment and usage inquiries from the cloud providers. Parks defrauded two well known cloud providers out of over $3.5 million US Parks personally raked in about $970,000 which he used to make lavish purchases including a Mercedes Benz, expensive jewelry and first class hotels and travel. And that does it for today's cybersecurity headlines. Useful alerts are critical in cybersecurity, but getting inundated with useless alerts wastes time, resources and our attention. How do we build out an alerting system that actually works? That's what we dig into on our latest episode of Defense In Depth. Look for how can we fix alert fatigue? Wherever you get your podcasts or head on over to csoseries.com thank you for listening to the podcast that brings you more of the top cyber news stories and more cowbell. I'm Sean Kelly. Cybersecurity headlines are available every weekday. Head to csoseries.com for the full stories behind the headlines.
