Exploited

now browsing by tag

 
 

Siemens PLC Feature Can Be Exploited for Evil

Source: National Cyber Security – Produced By Gregory Evans A hidden feature in some newer models of the vendor’s programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it. An undocumented access feature in some newer models of Siemens programmable logic controllers (PLCs) can be used as both a […] View full post on AmIHackerProof.com

#cybersecurity | Have you updated your browser yet? Severe Chrome Zero-day vulnerability getting actively exploited

Source: National Cyber Security – Produced By Gregory Evans

Estimated reading time: 2 minutes

Attention! Are you using Chrome as your web browsing software on your Windows, Linux and Mac? High time you update your browser!!

That’s right. With Google recently releasing Chrome version 78.0.3904.87 for Windows, Mac, and Linux, there come’s an urgent warning, requesting billions of users to update their software immediately. The warning comes after news of hackers exploiting two high-severity zero-day vulnerabilities. Apparently, the new Chrome version addresses these vulnerabilities.

What are these zero-day vulnerabilities?

According to Google, the following 2 zero-day vulnerabilities have been detected:

  • CVE-2019-13720 – This is basically a use-after-free-bug that has been detected in the audio component of Chrome.
  • CVE-2019-13721 – This again is a user-after-free security vulnerability and affects the PDFium library. This is basically used to view and generate PDF files in your browser, a feature that is commonly required by users.

How do these vulnerabilities work?

user-after-free security vulnerability is basically a memory-corruption flaw that allows modification or corruption of memory data, allowing a hacker to take control of an affected software or system. All that the remote attackers need to do, is to escalate privileges on your Chrome web browser by convincing you to click and visit a malicious website. This instantly allows attackers to run malicious code on your affected system while bypassing any sandbox protections.

How can you protect yourself?

The use-after-free vulnerability has been existing in the wild for quite some time now and is one of the most commonly discovered vulnerabilities. Thus, the chances of it reappearing in frequent periods are high.

Thankfully, Google has already released an update for this new Chrome version, to patch this active zero-day vulnerability and the stable channel has been updated to 78.0.3904.87. So now, all you need to do is to Click on the update arrow visible at the top-right corner of Chrome browser. Once you have successfully updated to the latest version of Chrome across your desktop and mobile, you will become safe from these vulnerabilities.

Such security bugs and vulnerabilities are bound to appear and reappear from time to time. It is for this reason that Quick Heal strongly recommends that you keep your web browser and security products up-to-date and follow best security practices for optimum defense against the rising/evolving threats and zero-day vulnerabilities.

 

Have something to add to this story? Share it in the

Source link

The post #cybersecurity | Have you updated your browser yet? Severe Chrome Zero-day vulnerability getting actively exploited appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers #target Office as #Microsoft warns of new #vulnerability being #exploited by Russia-linked #hackers

Source: National Cyber Security – Produced By Gregory Evans

Cyber crooks are taking advantage of a recently discovered vulnerability in Microsoft Office to hide malicious code in Word documents, the software giant has warned.

Furthermore, the flaws are being taken advantage of by a Russia-linked hacking group called APT28, who are expoiting a vulnerability in the Dynamic Data Exchange (DDE) component of Office.

According to the researchers, the hackers have been exploiting the flaw for around a month.

This is responsible for transporting data and messages between applications. The exploit affects Outlook email accounts, Word documents and Excel spreadsheets.

The hackers, also known collectively as Fancy Bear and linked with the Russian government, have benefited from the protocol because it doesn’t warn users to enable macros. However, pop-ups asking users to update files may sometimes appear.

Security firm McAfee claimed that the hacking group has been taking advantage of the recent New York terror attack to propagate its malicious code, inserting malware into a document talking about the incident.

“McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research,” it claimed.

“This document likely marks the first observed use of this technique by APT28. The use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim’s system, regardless whether macros are enabled.

“APT28, also known as Fancy Bear, has recently focused on using different themes. In this case it capitalised on the recent terrorist attack in New York City.

“The document itself is blank. Once opened, the document contacts a control server to drop the first stage of the malware, Seduploader, onto a victim’s system.”

Microsoft has since released a specialist advisory detailing the vulnerability and how it affects users. It is now working on a patch, but the Advisory effectively serves notice to other hacking groups of a glaring flaw in Office that others will now seek to exploit.

“In an email attack scenario, an attacker could leverage the DDE protocol by sending a specially crafted file to the user and then convincing the user to open the file, typically by way of an enticement in an email,” it said.

“The attacker would have to convince the user to disable Protected Mode and click through one or more additional prompts. As email attachments are a primary method an attacker could use to spread malware, Microsoft strongly recommends that customers exercise caution when opening suspicious file attachments.

“Microsoft strongly encourages all users of Microsoft Office to review the security-related feature control keys and to enable them. Setting the registry keys described in the following sections disables automatic update of data from linked fields.”

The post Hackers #target Office as #Microsoft warns of new #vulnerability being #exploited by Russia-linked #hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers exploited an Instagram bug to get celebrity phone numbers and email addresses

Source: National Cyber Security – Produced By Gregory Evans

An Instagram bug allowed hackers to access contact phone numbers and email addresses for high-profile users, the company said today. The bug was discovered recently in Instagram’s application programming interface, or API, which the service uses to communicate with other apps. Instagram declined to specify which users had been targeted,…

The post Hackers exploited an Instagram bug to get celebrity phone numbers and email addresses appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers exploited Word flaw for months while Microsoft investigated

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as CVE-2017-0199. The bug was unusually dangerous but of a common genre: it was in Microsoft … The post Hackers exploited Word […]

The post Hackers exploited Word flaw for months while Microsoft investigated appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

Microsoft says hackers have exploited zero-days in Windows 10’s Edge, Office, IE; issues fix

microsoft-windows-10-edge-browser-internet-explorer-2015-1

Source: National Cyber Security – Produced By Gregory Evans

Microsoft says hackers have exploited zero-days in Windows 10’s Edge, Office, IE; issues fix

Microsoft’s October Patch Tuesday is a reminder why you shouldn’t click links or open attachments from unknown senders.
Microsoft’s October Patch Tuesday fixes dozens of critical flaws, among them five affecting Internet Explorer, Edge, and Office that have already been

The post Microsoft says hackers have exploited zero-days in Windows 10’s Edge, Office, IE; issues fix appeared first on National Cyber Security.

View full post on National Cyber Security

NSA denies Report that Agency knew and exploited Heartbleed Vulnerability

The Bloomberg claimed that the U.S. National Security Agency (NSA) knew about the most critical Heartbleed flaw and has been using it on a regular basis to gather “critical intelligence” and sensitive information for at least past two years and decided to keep the bug secret, citing two sources ‘familiar with the matter’.In response to the above report, NSA has issued a ’94 character’ statement today denying the claims that it has known about the Heartbleed bug since two years and that it has been using it silently for the purpose of surveillance.”NSA was not aware of the recently identified Heartbleed vulnerability until it was made public,” the U.S. intelligence agency said on its Twitter feed.Heartbleed is one of the biggest Internet vulnerabilities in recent history that left large number of cryptographic keys and private data such as usernames, passwords, and credit card numbers, from the most important sites and services on the Internet open for hackers. The bug resides in the “Heartbeat” feature of the most secured open source encryption protocol, OpenSSL, which is used by several social networks, search engines, banks and other websites to enable secure connections while transmitting data.A team of researchers from Codenomicon and Google Security researcher revealed the vulnerability this week that is in the wild since the new version 1.0.1f was released in March 2012. And just after the revelation, OpenSSL released the security Fix for the bug in its version 1.0.1g, but until then the Heartbleed bug made websites, email, instant messaging (IM), including some virtual private networks, on about half a million of the world’s widely trusted web servers, open to hackers.The birth of the most critical bug Heartbleed was due to a mistake done by a German programmer Robin Seggelmann over two years ago while working on a new Heartbeat feature in the OpenSSL.He submitted the code of OpenSSL with the heartbeat feature in an update on New Year’s Eve, 2011, and an “oversight” led to an error that unintentionally created the “Heartbleed” vulnerability.Yesterday he said it could be entirely possible that the government intelligence agencies had been making use of this critical flaw over the past two years.The fix was released just after, but the users’ data are vulnerable until the vulnerable websites didn’t implement it. You can only change your password immediately for those websites that are not affected, assuming that it was vulnerable before, just to make sure that you are now safe.Follow me on Google+, Twitter or LinkedIn or Contact via Email.

Source: http://whogothack.blogspot.co.uk/2014/04/nsa-denies-report-that-agency-knew-and.html#.VkpDTVUrLIU

The post NSA denies Report that Agency knew and exploited Heartbleed Vulnerability appeared first on Am I Hacker Proof.

View full post on Am I Hacker Proof

National Center for Missing & Exploited Children partners with Nixle to assist law enforcementNational Cyber Security

nationalcybersecurity.com – Your baby won’t remember any of this … You hope. View full post on Parents – The Huffington Post #pso #htcs #b4inc DEMO OF PASS-OUT THE DRINKING GAME FOR 2 OR MORE ADULT PLAYERS AND WHAT IT IS WORT…

View full post on Hi-Tech Crime Solutions Daily

National Center for Missing & Exploited Children partners with Nixle to assist law enforcement

Top Priority Sector:  law_enforcement_first_responders The National Center for Missing & Exploited Children (NCMEC) has joined forces with public safety notification provider

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security