WME Security Briefing 13 August 2024

WME Cybersecurity Briefings No. 022

DoJ and FTC File Lawsuit Against TikTok for Violating Children’s Privacy Laws

Overview

The U.S. Department of Justice and the Federal Trade Commission have filed a lawsuit against TikTok. They allege that TikTok has been violating US laws of children privacy.

Impact

They say TikTok let kids make accounts, even though they knew how old they were. It’s crazy – they let kids see and share stuff with grown-ups! The government says TikTok stole kids’ private info without telling their parents. This is against the law, breaking a rule called COPPA.

TikTok was already in trouble for not telling parents when they got kids’ info and for keeping videos of kids under 13. But they didn’t stop there! Even when they had a special “Kids Mode,” they still got kids’ emails and other private stuff.

Because of TikTok, kids saw ads just for them and could talk to older people. It was easy for kids to find bad stuff too. People who check accounts only took a few seconds to see if someone was a kid, which isn’t enough time.

Recommendation

Parents need to pay attention to what your kids do online! Know what apps they use and how to protect them. You can even delete their TikTok account to keep them safe.

People who work on websites and care about privacy should watch this case. All online places need to follow the rules about kids’ data. They must delete info when parents ask, fast.

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

Overview

Researchers uncover a new breed of attack, Distributed Denial of Service (DDoS). But this one’s got a twist. Instead of targeting your typical website, these bad actors are zeroing in on misconfigured Jupyter Notebooks.

That’s right, those handy tools data scientists love are now a cyber battleground! The attack, cleverly named Panamorfi by the cloud security experts, uses a Java-based tool called mineping. It was originally designed for Minecraft servers and has been hijacked to unleash TCP connection requests. It then overwhelms the target system, like using a water gun to create a tsunami!

Impact

The attack starts by grabbing a ZIP file from a file-sharing site. Inside, you’ll find two sneaky JAR files: conn.jar and mineping.jar. The first one sets up a secret channel on Discord, and then it’s game on for mineping.jar. This little troublemaker starts sending out a crazy amount of TCP connection requests, basically drowning the target server. The attackers even get a live show of the chaos by watching the results unfold on their Discord channel.

This whole operation seems to be the work of a shadowy figure, yawixooo. They’ve even got a public GitHub repository with a Minecraft server properties file.

Recommendation

So, what can you do to protect yourself? First, lock down your Jupyter Notebooks. Make sure only trusted people can access them. Also, keep them updated with the latest security patches.

Next, monitor your network traffic closely. Look for anything unusual, like a sudden surge of connections.

And finally, don’t forget about your firewall. This digital wall can help block unwanted visitors from crashing your systems.

Remember, prevention is always better than cure when it comes to cybersecurity. If you follow these tips, you can significantly reduce the risk of DDoS attacks.

APT41 Cyber Attack on Taiwanese Institute: ShadowPad & Cobalt Strike in Action

Overview

A top-secret research lab in Taiwan, filled with brilliant minds working on cutting-edge tech, becomes the target of a cyberattack. The culprits are a shadowy group of hackers linked to the Chinese govt. They’re after valuable info and are not afraid to get their hands dirty. According to cybersecurity experts, these digital spies broke into the lab as early as last July. They used some pretty nasty tricks to sneak in and steal sensitive documents.

Impact

The hackers started by exploiting a super old and vulnerable software on the lab’s computers. Once inside, they unleashed their secret weapon: ShadowPad. It’s a sneaky piece of malware that acts like a backdoor, giving them constant access to the system. But they didn’t stop there.

They used another tool called Cobalt Strike to move around undetected and steal passwords. They even managed to escalate their privileges, giving them superpowers within the system. The hackers were pros. They covered their tracks, using a web shell to hang around unnoticed and download more malicious tools.

Recommendation

So, how can you stop these cyber ninjas? First, you need to keep your software up-to-date. You also need to be on high alert, watching for suspicious activity on your computers. You need Strong passwords, firewalls, and security software. And finally, you need smart security tools that can outsmart these hackers.

Diplomatic Targets Under Attack by APT28 with HeadLace Malware

Overview

A cyber espionage campaign has been recently discovered and attributed to the Russian threat actor: APT28. This group is also recognized by the aliases Fancy Bear and Sofacy. Palo Alto Network identifies the group as the perpetrator of this attack. The attack leverages a phishing lure centered around car sales to deliver the Windows backdoor malware: HeadLace. It commenced in March 2024, specifically targeting diplomatic personnel.

Impact

APT28’s modus operandi involves a sophisticated delivery mechanism. Phishing emails entice recipients to download a ZIP archive. It contains a seemingly benign Windows calculator executable. This file is a conduit for sideloading a malicious DLL. These DLLs are the core component of the HeadLace backdoor. The malware empowers attackers with remote command execution capabilities. It helps retrieve additional payloads and allows unauthorized access to sensitive info. The campaign utilizes legit services like webhook[.]site (to distribute the payload), which helps it avoid detection.

Recommendations by WME

✔️ Comprehensive user awareness training to identify phishing attempts.

✔️ Advanced email filtering capabilities to block malicious messages.

✔️ Top-class endpoint protection to block malicious DLL sideloading activities.

✔️ Network traffic monitoring for anomalies.

Mirai Botnet Targeting OFBiz Servers Vulnerable to Directory Traversal

Overview

Reports indicate a concerning trend as the latest Mirai botnet variants emerge. They target the open-source ERP framework OFBiz and exploit a directory traversal vulnerability in OFBiz versions before 18.12.13. A security patch to address this issue was released in May this year.

Impact

The vulnerability allows hackers to bypass access controls and gain unauthorized access to sensitive systems. That said, they can exploit the “forgotPassword” functionality to execute arbitrary code in OFBiz only by including a semicolon in the URL. So, there’s a huge risk of data breaches and system compromises.

Recommendation

To mitigate this risk, admins must prioritize the update of OFBiz to version 18.12.13 or later. It’s essential to monitor networks for anomalies, specifically traffic originating from identified IPs (95.214.27.196; 83.222.191.62; 185.196.10.231, etc. ).

You should implement access controls and intrusion detection systems to strengthen your organization’s security posture further.

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 024
Cyber Security

WME Security Briefing 28 August 2024

GhostWrite Vulnerability in T-Head CPUs Exposes Devices to Unrestricted Access Overview A critical architectural flaw in T-Head’s XuanTie C910 and C920 RISC-V CPUs was uncovered by recent research from the CISPA Helmholtz Center for Information Security. Dubbed GhostWrite, the vulnerability

Click Here to Read Full Article »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=