White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe

Read Time:7 Minute, 51 Second

The White House recently reissued a warning to American businesses in response to the unprecedented economic sanctions the U.S. has imposed on Russia for the Ukraine invasion, stating, “There is now evolving intelligence that Russia may be exploring options for potential cyberattacks.”  

Along with this statement, the White House published a fact sheet outlining the new and ongoing steps the government is taking to protect its infrastructure and technologies, along with steps that private businesses can take to protect themselves from attacks as well.  

Of course, any successful attack on government operations and the operations of private businesses could potentially affect households as well—such as in the case of data breaches where data or information is stolen from a system, often the personal data and information of individuals. 

Word of potential attacks understandably leaves people feeling uncertain and may further leave them wondering if there’s anything they can do to protect themselves. With regards to data breaches and the cases of identity theft that typically follow, there are several steps people can take to keep safer online.  

Let’s break down what a data breach looks like, how it can affect you, and what you can do in advance of a breach to protect yourself. 

Examples of data breaches in the past 

We’ve certainly seen data breaches make the news over the years, which are often (but not always) associated with malicious hackers or hacker organizations. A quick list of some of the largest and most impactful breaches we’ve seen in recent years: 

Facebook – 2019: Two datasets leaked the records of more than 530 million users, including phone numbers, account names, Facebook IDs, and more. 
Marriott International (Starwood) – 2018. Leakage of 500,000 guest names, emails, actual mailing addresses, phone numbers, passport numbers, Starwood Preferred Guest account information, date of birth, and information about stays. 
Equifax – 2017. Approximately 147 million records, including name, address, date of birth, driver’s license numbers, and Social Security Numbers were leaked, as well as credit card information for a further 200,000 victims. 

Healthcare facilities have seen their data breached, along with the operations of popular restaurants. Small businesses find themselves in the crosshairs as well, with one report stating that 43% of data leaks target small businesses. Those may come by way of an attack on where those businesses store their records, a disgruntled employee, or by way of a compromised point-of-sale terminal in their store, office, or location. 

What differs with the White House warning is who may end up being behind these potential attacks—a nation-state rather than what are financially motivated hackers or hacking groups. (Some research indicates that nearly 90% of breaches are about the money.) However, the result is the same. Your personal information winds up loose in the world and possibly in the hands of a bad actor.   

What can get exposed in a data breach?  

The fact is that plenty of our information is out there on the internet, simply because we go about so much of our day online, whether that involves shopping, banking, getting results from our doctors, or simply hopping online to play a game once in a while.  

Naturally, that means the data in any given breach will vary from service to service and platform to platform involved. Certainly, a gaming service will certainly have different information about you than your insurance company. Yet broadly speaking, there’s a broad range of information about you stored in various places, which could include:  

Username and password 
E-mail address 
Phone numbers and home address 
Contact information of friends and family 
Date of birth 
Driver’s license number 
Credit card and debit card numbers, bank account details 
Purchase history and account behavior history 
Patient information (in the case of healthcare breaches) 
Social Security Number or Tax ID Number 

As to what gets exposed and when you might find out about it, that can vary greatly as well. One industry research report found that 60% of breaches were discovered in just days from the initial attack while others could take months or even longer detect. Needless to say, the timeline can get rather stretched before word reaches you, which is a good reason to change your passwords regularly should any of them get swept up in a breach. (An outdated password does a hacker no good—more on that in a bit.) 

What do cybercriminals do with this kind of information? 

The answer is plenty. In all, personal information like that listed above has a dollar value to it. In a way, your data and information are a kind of currency because they’re tied to everything from your bank accounts, investments, insurance payments—even tax returns and personal identification like driver’s licenses.  

With this information in hand, a crook can commit several types of identity crimes—ranging from fraud to theft. In the case of fraud, that could include running up a bill on one of your credits cards or draining one of your bank accounts. In the case of theft, that could see crooks impersonate you so they can open new accounts or services in your name. Beyond that, they may attempt to claim your tax refund or potentially get an ID issued in your name as well. 

Another possibility is that a hacker will simply sell that information on the dark marketplace, perhaps in large clumps or as individual pieces of information that go for a few dollars each. However it gets sold, these dark-market practices allow other fraudsters and thieves to take advantage of your identity for financial or another gain.  

Protecting yourself from the effects of data breaches 

The succinct answer is to sign up for an identity protection service. It can monitor dozens of types of personal information and then alert you if any of them are possibly being misused, so you can address any issues right away before they become a potentially much bigger problem.  

Further, pairing identity protection with online protection software can protect you even more. With an all-up view of your overall online security—how well you’re protecting yourself and your identity online—it can guide you through steps that can shore up your protection and make you safer still. 

Identity protection such as ours gives you the added benefit of a professional recovery specialist who can assist with restoring your affairs in the wake of fraud or theft, plus up to $1 million in insurance coverage. 

What if I think I’m the victim of identity theft? 

When a business, service, or organization falls victim to a breach, it doesn’t always mean that you’re automatically a victim too. Your information may not have been caught up in it. However, it’s best to act as if it was. With that, we strongly suggest you take these immediate steps. 

Change your passwords and use two-factor authentication 

Given the possibility that your password may be in the hands of a bad actor, change it right away. Strong, unique passwords offer one of your best defenses against hackers. Update them regularly as well. As mentioned above, this can protect you in the event a breach occurs and you don’t find out about it until well after it’s happened. You can spare yourself the upkeep that involves a password manager that can keep on top of it all for you. If your account offers two-factor authentication as part of the login process, make use of it as it adds another layer of security that makes hacking tougher.  

Keep an eye on your accounts 

If you spot unusual or unfamiliar charges or transactions in your account, bank, or debit card statements, follow up immediately. That could indicate improper use. In general, banks, credit card companies, and many businesses have countermeasures to deal with fraud, along with customer support teams that can help you file a claim if needed. 

Sign up for an identity theft protection service 

As outlined above, identity protection like ours can monitor a broad set of your personal information and provide you guidance for making it more secure, in addition to getting help from a professional recovery specialist.  

For an even closer look at identity theft, we have two articles that can help guide the way if you think you’re a victim, each featuring a series of straightforward steps you can take to set matters right: 

Top Signs of Identity Theft 
How to Report Identity Theft to Social Security 

Proactively protecting yourself and your family 

No matter how uncertain news of possible cyberattacks may any of us feel, you can take steps to set some of that uncertainty aside. An identity protection service is a strong first move against possible identity theft, as is pairing it with online protection software that keeps you safer online overall. Likewise, knowing the signs of possible identity theft and what you can do to address it right away offer further assurance still—like having the services of a professional recovery specialist to help.  

In all, there’s no need to leave yourself wondering at the news from the White House. As an individual, you have it in your power to make yourself and your family safer than they are now. 

The post White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe appeared first on McAfee Blog.

Read More

SpringShell (Spring4Shell) : New Unpatched RCE Vulnerability in Spring Core Framework

Read Time:2 Minute, 23 Second

FortiGuard Labs is aware that an alleged Proof-of-Concept (POC) code for a new Remote Code Execution (RCE) vulnerability in Spring Core, part of the popular web open-source framework for Java called “Spring,” was made available to the public (the POC was later removed). Dubbed SpringShell (Spring4Shell), CVE-2022-22965 has been assigned to the vulnerability and an emergency fix was released on March 31st, 2022.Why is this Significant?This is significant because Spring Core is part of Spring Framework, one of the most popular JAVA frameworks used in the field and is very popular for enterprise applications. As such, wide exploitation of the vulnerability can impact users globally if the security update is not applied.What is the Vulnerability Detail?An insecure de-serialization exists in Spring Core Framework. The vulnerability is due to insufficient validation of user supplied inputs and could lead to remote code execution.The official advisory reads “A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it”.Has the Vendor Released an Advisory?An advisory has been published by both Spring and VMware, who supports Spring. See the Appendix for a link to “Spring Framework RCE, Early Announcement” and “CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+”.What Versions of Spring Core are Vulnerable?The official advisory states that the following prerequisites for the exploit:JDK 9 or higherApache Tomcat as the Servlet containerPackaged as a traditional WAR (in contrast to a Spring Boot executable jar)spring-webmvc or spring-webflux dependencySpring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older versionsHas a CVE been Assigned to the Vulnerability?CVE-2022-22965 has been assigned to the vulnerability.There is a lot of online chatter about SpringShell being related to CVE-2022-22963 or CVE-2022-27772, but that is not the case.CVE-2022-22963 is a vulnerability in Spring Cloud and was patched on March 29, 2022.CVE-2022-27772 is a vulnerability in Spring Boot that allows temporary directory hijacking.Has the Vendor Released a Patch?Yes, the fix was released on March 31, 2022 for the following versions of Spring Framework:5.3.185.2.20What is the Status of Coverage?FortiGuard Labs provides the following AV coverage based on available SpringShell POCs:Python/SpingShell.A!exploitFortiGuard Labs is currently investigating for IPS coverage. This Threat Signal will be updated when coverage becomes available.

Read More

mod_auth_openidc-2.4.9.4-1.fc36

Read Time:14 Second

FEDORA-2022-814ee0c43b

Packages in this update:

mod_auth_openidc-2.4.9.4-1.fc36

Update description:

mod_auth_openidc 2.4.9.4 security update

CVE-2021-39191 mod_auth_openidc: open redirect by supplying a crafted URL in the target_link_uri parameter

Read More

mod_auth_openidc-2.4.9.4-1.fc37

Read Time:21 Second

FEDORA-2022-714b48d4d5

Packages in this update:

mod_auth_openidc-2.4.9.4-1.fc37

Update description:

Automatic update for mod_auth_openidc-2.4.9.4-1.fc37.

Changelog

* Thu Mar 31 2022 Tomas Halman <thalman@redhat.com> – 2.4.9.4-1
– Resolves: rhbz#2001647 – CVE-2021-39191 mod_auth_openidc: open redirect
by supplying a crafted URL in the target_link_uri
parameter

Read More

USN-5359-1: rsync vulnerability

Read Time:11 Second

Danilo Ramos discovered that rsync incorrectly handled memory when
performing certain zlib deflating operations. An attacker could use this
issue to cause rsync to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Read More

C’est la journée mondiale de la sauvegarde!

Read Time:4 Minute, 56 Second

Jouons à un jeu. Accédez à l’appli Photos de votre téléphone et voyez le nombre total de vidéos et d’images qu’il contient. Tous ces précieux souvenirs de vacances en famille, les extraits de votre concert préféré et les innombrables photos de votre compagnon à fourrure. Ensuite, ouvrez votre ordinateur portable ou de bureau et vérifiez le nombre de documents que vous avez enregistrés. Par exemple, les rapports de recherche utilisés pour défendre votre thèse ou la présentation importante que vous ferez lundi à votre patron. Si vous deviez deviner, diriez-vous que ces différentes données se comptent par milliers? Imaginez maintenant qu’elles disparaissent toutes soudainement. Que feriez-vous?

Vous pensez peut-être : « Cela ne m’arrivera jamais. » Cette situation est pourtant plus fréquente que vous ne le pensez. Plus de 60 millions d’ordinateurs tomberont en panne dans le monde cette année. Et plus de 200 000 téléphones intelligents sont perdus ou volés chaque année. C’est pourquoi nous célébrons la Journée mondiale de la sauvegarde : pour expliquer comment sauvegarder correctement vos fichiers et avoir l’esprit tranquille en sachant que vos données sont en sécurité.

En quoi consistent les sauvegardes et pourquoi sont-elles importantes?

Une sauvegarde est une copie séparée de vos informations numériques et fichiers importants. Stocker toutes ces données au même endroit, comme un ordinateur personnel ou un téléphone, peut s’avérer dangereux. La création d’une autre copie de ces données au moyen d’une sauvegarde garantira qu’elles sont stockées de façon sécuritaire si votre appareil est effacé ou volé.

Il est important de comprendre que la perte de données n’arrive pas qu’aux grandes sociétés ou aux victimes peu méfiantes des films d’espionnage. La perte ou le vol de données peut arriver à tout le monde. La sauvegarde de vos informations est une étape simple pour les protéger et empêcher les cybercriminels de s’en emparer.

Stockage de données 101

Les données sont l’un des actifs les plus importants du monde moderne. Comme illustré précédemment, nous collectons tous d’innombrables fichiers contenant des informations importantes que nous souhaitons conserver. Heureusement, il existe deux façons courantes et peu coûteuses de stocker des données et leurs sauvegardes.

Stockage dans le nuage

Bien que « le nuage » soit devenu un mot à la mode il y a des années, sa définition reste encore floue pour bien des gens. Le nuage existe dans des centres de données distants auxquels vous pouvez accéder par le biais d’Internet. Toutes les données téléchargées dans le nuage existent sur des serveurs dédiés et des volumes de stockage hébergés dans des entrepôts distants, souvent situés sur des sites remplis d’entrepôts semblables. Les centres de données appartiennent à des fournisseurs de services nuagiques, qui sont chargés de maintenir les serveurs opérationnels.

Pour protéger physiquement vos données contre le vol et la destruction, et garantir qu’elles sont disponibles chaque fois que vous souhaitez y accéder, les centres de données utilisent des systèmes de refroidissement étendus pour empêcher la surchauffe des appareils électroniques et disposent d’au moins un générateur de secours en cas de panne de courant. Mais comment s’assurent-ils que ces données sont sécurisées dans la cybersphère? Les systèmes nuagiques utilisent des procédures d’authentification par noms d’utilisateur et mots de passe pour limiter l’accès, et le chiffrement des données pour les protéger du vol ou des interceptions. Cependant, il est important de se rappeler que les mots de passe peuvent être piratés. Généralement, le fournisseur de services détient les clés de chiffrement de vos données, ce qui signifie que des employés malveillants pourraient, en théorie, y accéder. De même, vos données pourraient également être recherchées et saisies par des entités gouvernementales.

Cela soulève une question : Faire confiance ou ne pas faire confiance? Puisque la survie des entreprises de stockage nuagique dépend en premier lieu de leur réputation, vous pouvez être assuré qu’elles s’efforcent d’utiliser les techniques de sécurité les plus avancées et de fournir le service le plus fiable possible. Pour garantir la sécurité de vos données si vous choisissez de les stocker ou de les sauvegarder dans le nuage, conservez tout ce qui est vraiment sensible dans un nuage privé, abrité derrière un pare-feu.

Disque dur externe

Avec un disque dur externe, vous pouvez sauvegarder manuellement l’ensemble de vos données et de vos fichiers sur un appareil physique auquel vous pouvez accéder à tout moment. Ces disques constituent un moyen fiable d’obtenir des données redondantes. Un disque dur externe ne dépend pas de l’accès à Internet comme les services basés dans le nuage. Il constitue donc une solution simple lors du transfert de données vers un nouvel appareil. Cependant, l’utilisation de disques durs externes requiert que vous interveniez plus directement dans la de sauvegarde de vos données. Il est de votre responsabilité d’effectuer vous-même des sauvegardes régulières et de stocker votre disque dur dans un endroit sûr. Alors que les solutions nuagiques offrent un énorme espace de stockage, les disques durs en proposent un plus limité. Vous devrez donc peut-être acheter plus d’un appareil. Recherchez un disque externe qui offre au moins un téraoctet d’espace pour héberger toutes vos données, car celles-ci ont tendance à s’accumuler rapidement.

Lancez votre nettoyage de printemps numérique

Quand vous nettoyez votre garage et rangez votre maison, faites un ménage numérique avec autant de soin en cette Journée mondiale de la sauvegarde. Désencombrez vos appareils, applis et comptes en ligne et gagnez en tranquillité d’esprit en sachant que toutes vos précieuses données sont stockées dans un endroit sûr et sécurisé… et que vous disposez d’une sauvegarde en cas de problème. N’oubliez pas que la proactivité contribue grandement à renforcer votre cybersécurité et à protéger vos informations.

 

The post C’est la journée mondiale de la sauvegarde! appeared first on McAfee Blog.

Read More

News, Advisories and much more

Exit mobile version