Printer pwnage, phone poppage, and apparently US Homeland Security needs security help

Plus: The spambot that actually DOES record screens of pr0n users

Roundup Here is your friendly summary of recent news from the front lines of information security beyond everything else we've already reported.

Our vultures have also spent the past week or so flying around Las Vegas, keeping a close eye on what is essentially hacker comic con. Follow these links for our Black Hat, DEF CON, and Bsides coverage, and stay tuned for more this week.

Printers still a security weak point

Xerox printers are rife with security bugs that can put the rest of the network at risk.

This from bug-hunters at the NCC Group, who this week disclosed a pack of eight CVE-listed security flaws in the popular line-of-business printers. The flaws range from a lack of cross-site request forgery protections to buffer overflow errors that could allow for remote code execution via the web interface.

While a printer getting pwned is not the worst of scenarios, it could become one should the printer be used as the starting point for a larger network breach. Additionally, printers have been popular targets for botnets.

ESET warns of porn-peeping malware infection

A newly discovered piece of malware looks to catch its victims in compromising situations.

ESET says that "Varenyky", a spam and spyware combo that infects French-language systems, includes a set of instructions that will activate the system's screen recording tools when the user searches for specific terms used while crawling porn sites (we'll leave it to you readers to figure out what those are).

"It will start two threads: one that's in charge of sending spam and another that can execute commands coming from its Command and Control server on the computer," said Alexis Dorais-Joncas of the ESET Montreal R&D center.

"One of the most dangerous aspects is that it looks for specific keywords such as bitcoin and porn-related words in the applications running on the victim's system. If any such words are found, Varenyky starts recording the computer's screen and then uploads the recording to the C&C server."

Avaya phones dial "P" for pwnage

Bug-hunters at McAfee have found a decade-running security vulnerability in a popular line of Avaya VoIP phones.

The team said the Avaya 9600 series uses a specific open-source component in the H.232 software stack that Avaya branched for its own use back in 2009.

Shortly after the code was copied, someone found a vulnerability in the open-source tool that would allow for remote code execution. While the original component was updated to fix the bug, Avaya's copy was not, and for the last 10 years the phones have been operating with an exploitable RCE bug.

Avaya has since issued an update to patch the flaw once and for all.

US government seeks contractor to help short-handed DHS security teams

The US Department of Homeland Security is looking to hire an outside contractor help its agencies manage their information security operations.

A Federal Business Opportunities posting first spotted by NextGov outlines a program that would see the contractor help to staff the 17 unclassified security operation centers (SOCs) across its agencies.

That contractor, if the deal were to come about, would be charged with doing things like helping fill out staffing shortfalls in areas like vulnerability assessment, email security monitoring, and incident response.

"DHS envisions a multiple award contract vehicle under which each awardee is capable of delivering the full scope of services described in this statement of work," the posting reads.

The DHS is still in the process of deciding the specifics of the contract, so would-be bidders have plenty of time to get their pitches together.

Ellucian off the hook for university hacks

Last month, the US Department of Education issued an alert warning that a flaw in the Ellucian Banner System software had been exploited to get into the networks of more than 60 US colleges and universities.

Now, however, the department is walking that claim back, now saying that something else was responsible for the breaches, which implies the Ellucian software was not.

"Our ongoing research with targeted institutions has led us to a broader concern regarding the front-end registration portals used by institutions," the education bod says.

"Specifically, some institutions are using third-party software as front-end access points to the Ellucian Banner System and similar administrative tools."

F-Secure uncovers BIG-IP vulnerability

Finnish security folks at F-Secure have issued an warning to companies using some F5 Networks load balancers following the discovery of a command injection flaw.

F-Secure said the vulnerability is present in the BIG-IP balancers, which use the Tcl programming language for their iRules commands. Apparently, Tcl contains a flaw that would let an attacker slip arbitrary commands into scripts.

"Adversaries that successfully exploit such insecurely configured iRules can use the compromised BIG-IP device as a beachhead to launch further attacks, resulting in a potentially severe breach for an organization," F-Secure warned.

"They could also intercept and manipulate web traffic, leading to the exposure of sensitive information, including authentication credentials and application secrets, as well as allowing the users of an organization's web services to be targeted and attacked."

VPNs (still) behaving badly

Last year, a report from Metric Labs' Top10VPN found that many VPN apps are shady at best and a privacy nightmare in the worst case. An updated report from the same research team has found that, a year on, not much has changed.

Top10VPN's Simon Migliano told El Reg that when he followed up the report six months on, 75 per cent of the offending apps were not only still being offered on the App Store and Google Play, but several were actually surging in popularity.

"Apple and Google ignored my request so I have published my findings in a comprehensive new report," Migliano explained. "Since the publication, Apple have now agreed to look at the report but have yet to take any action."

Cloud Atlas attack goes polymorphic

A long-running government hacking campaign called "Cloud Atlas" or "Inception" (depending on your taste in bad movies) has armed itself with a new set of capabilities in its efforts to get into machines in Eastern Europe and the Middle East.

Kaspersky reports that the hacking crew has added a new layer of polymorphic (self-changing) malware that not only shifts around its codebase to avoid detection, but also wipes the files used in previous stages to make its activity harder to detect.

If you're one of the handful of governments in the area in and around Russia who are subject to this operation, you'll want to give the report a close look. Everyone else, meanwhile, should probably be more concerned about the upcoming Patch Tuesday.

Study probes the *other* AWS data exposure trap

We all know by now that AWS S3 buckets are a treasure trove for data leaks thanks to incorrectly-configured storage instances. It turns out another AWS service, Elastic Block Storage, can also betray corporate data.

A Defcon presentation from Bishop Fox showed that EBS instances can also be crawled to find sensitive corporate information and leave the door open for other data theft, with things like encryption keys, passwords, and in some cases entire backups all left sitting out in the open.

Admins would be well-advised to double-check their EBS configurations and make sure public access is severely restricted. ®

Other stories you might like

  • Robotics and 5G to spur growth of SoC industry – report
    Big OEMs hogging production and COVID causing supply issues

    The system-on-chip (SoC) side of the semiconductor industry is poised for growth between now and 2026, when it's predicted to be worth $6.85 billion, according to an analyst's report. 

    Chances are good that there's an SoC-powered device within arm's reach of you: the tiny integrated circuits contain everything needed for a basic computer, leading to their proliferation in mobile, IoT and smart devices. 

    The report predicting the growth comes from advisory biz Technavio, which looked at a long list of companies in the SoC market. Vendors it analyzed include Apple, Broadcom, Intel, Nvidia, TSMC, Toshiba, and more. The company predicts that much of the growth between now and 2026 will stem primarily from robotics and 5G. 

    Continue reading
  • Deepfake attacks can easily trick live facial recognition systems online
    Plus: Next PyTorch release will support Apple GPUs so devs can train neural networks on their own laptops

    In brief Miscreants can easily steal someone else's identity by tricking live facial recognition software using deepfakes, according to a new report.

    Sensity AI, a startup focused on tackling identity fraud, carried out a series of pretend attacks. Engineers scanned the image of someone from an ID card, and mapped their likeness onto another person's face. Sensity then tested whether they could breach live facial recognition systems by tricking them into believing the pretend attacker is a real user.

    So-called "liveness tests" try to authenticate identities in real-time, relying on images or video streams from cameras like face recognition used to unlock mobile phones, for example. Nine out of ten vendors failed Sensity's live deepfake attacks.

    Continue reading
  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading

Biting the hand that feeds IT © 1998–2022