Exposed VNC instances threatens critical infrastructure as attacks spike

Read Time:55 Second

New research from threat intelligence and cybersecurity company Cyble has identified a peak in attacks targeting virtual network computing (VNC) – a graphical desktop-sharing system that uses the Remote Frame Buffer (RFB) protocol to control another machine remotely – in critical infrastructure sectors. By analyzing the data from its Global Sensor Intelligence (CGSI), Cyble researchers noticed a threefold spike in attacks on port 5900 (the default port for VNC) between July 9 and August 9, 2022. Most attacks originated from the Netherlands, Russia, and Ukraine, according to the firm, and highlight the risks of exposed VNC in critical infrastructure.

Exposed VNC putting ICS at risk, assets frequently distributed on cybercrime forums

According to a blog posting detailing Cyble’s findings, organizations that expose VNCs over the internet by failing to enable authentication broaden the scope for attackers and increase the likelihood of cyber incidents. It detected more than 8,000 exposed VNC instances with authentication disabled. Cyble also found that exposed assets connected via VNCs are frequently sold, bought, and distributed on cybercrime forums and market.

To read this article in full, please click here

Read More

Penetration Testing as a Service (PTaaS): the evolution of Penetration Testing at AT&T

Read Time:2 Minute, 47 Second

Definition:

Let us start by defining Penetration Testing as a Service (also known as PTaaS) because there are several different definitions and variations being used throughout the industry. Some of the similarities include:

Continuous or more frequent penetration tests to create a find – fix – verify loop that provides a closer to real-time awareness of your environment to account for drift and verification of your remediation efforts to ensure its effectiveness
Leveraging cloud-based platforms, automation, and AI to speed up this entire cycle

This is where AT&T starts to differentiate itself from competitors. This next part we believe to be critical:

Augmenting automation and AI with manual testing and analysis by knowledgeable human experts

There is a misconception about Penetration Testing as a Service, that it devalues the quality of testing. This is rooted in a distrust of platforms being marketed as fully autonomous, that use “trigger words” like AI, and leave human expertise out of the loop.

Don’t believe the marketing hype, fully autonomous penetration testing is not ready for prime time and it likely will never be. These systems need to be trained by humans who have a deep understanding of the tactics, techniques, and procedures used to perform attacks manually and know how to identify errors and gaps in the system and its testing coverage.

A perfect analogy is the current state of autonomous vehicles, where the most successful and reputable brands require the driver’s hands to be on the wheel during the vehicle’s operation. Here at AT&T, rest assured a penetration tester is in control, ready to step in and take control as needed to perform a thorough penetration test.

Now let us discuss a few of the benefits to this approach.

Benefits:

The flexibility of multiple tiers of service and price points: Automated, manual, and hybrid solutions exist today. Annual “one-and-done” penetration tests have limited value and the industry has already moved on to more frequent testing. We also have options for quarterly, monthly, or on-demand testing. Once you are onboarded and have scheduled and completed your first penetration test with us, we can even perform one-click verification of individual findings after remediation.

Return on investment: Penetration Testing engagements are priced based on Level of Effort (LOE) measured in hours. If some of this precious time is spent manually orchestrating and configuring infrastructure to perform attacks, there is less time remaining for testing, analysis, and report writing.

Speed of testing: New threats are discovered and weaponized by attackers so quickly that waiting for development cycles to integrate detection and proof of concept exploits into a product/platform is a losing battle. By augmenting these tools with a penetration tester, we can bridge that gap and notify you of the highest risk findings as soon as the testing has completed.

There is no need for you to wait until the full report is delivered before you start your remediation efforts. This leaves a smaller window of exposure.

Which frequency of testing is right for me? 

That depends on your risk profile and budget but testing more than once a year is a great start, and we will demonstrate to you the value of more frequent testing. Are you ready? To learn more, check out AT&T Cybersecurity’s penetration testing services.

Read More

Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable

Read Time:21 Second

The fallout of the SolarWinds cybersecurity incident, coupled with Cybersecurity Executive Order (EO) put the topic of software supply chain security, and by association, software bills of material (SBOM) center stage in the security dialog. Coupled with the Log4j vulnerability and impact that left countless organizations scrambling to determine the impact, SBOMs are now a critical component of modern cybersecurity vulnerability programs. 

To read this article in full, please click here

Read More

Win32.Ransom.BlueSky / Arbitrary Code Execution

Read Time:20 Second

Posted by malvuln on Aug 15

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/961fa85207cdc4ef86a076bbff07a409.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Win32.Ransom.BlueSky
Vulnerability: Arbitrary Code Execution
Description: The BlueSky ransomware looks for and executes arbitrary DLLs
in its current working directory. Therefore, we can hijack a vuln DLL,
execute our own code, control…

Read More

Zyxel IPC 3605N & 4605N / Remote shell access

Read Time:24 Second

Posted by Eric Urban on Aug 15

Hello everyone,

I have identified that the Zyxel IPC 3605N and 4605N IP based security
cameras have multiple flaws. Combining these together leads to the ability
for an attacker to remotely install root shell access on the device.

A web server installed for UPnP purposes allows the plaintext passwords to
be retrieved by anyone. This grants access to the web administration
interface. From there, a tarball can be downloaded, modified with a…

Read More

Re: typeorm CVE-2022-33171

Read Time:28 Second

Posted by Andrii Kostenko via Fulldisclosure on Aug 15

I found what I think is a vulnerability in the latest typeorm 0.3.7.
TypeORM v0.3 has a new findOneBy method instead of findOneById() and it is
the only way to get a record by id

Sending undefined as a value in this method removes this parameter from the
query. This leads to the data exposure.

For example:
Users.findOneBy({id: req.query.id}) with /?id=12345 produces SELECT * FROM
Users WHERE id=12345 LIMIT 1 while removing id from the query…

Read More