The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous page

    All about Security, News, Events and Incidents

    Discussion in 'Security and Anti-Virus Software' started by Dr. AMK, Apr 26, 2018.

  1. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Kaseya says up to 1,500 businesses compromised in massive ransomware attack
    https://www.cnn.com/2021/07/06/tech/kaseya-ransomware-attack-businesses-affected/index.html
    (CNN Business)Software vendor Kaseya says that between 800 and 1,500 businesses have been compromised by the recent ransomware attack that has ricocheted around the world.
    210705120547-kaseya-file-large-169.jpg
    Kaseya said in a statement on Monday that approximately 50 of its direct customers were breached in the attack that began to unfold on Friday. But hundreds more companies were affected because many of Kaseya's customers provide IT services to small businesses such as restaurants and accounting firms.
    "Our global teams are working around the clock to get our customers back up and running," Kaseya CEO Fred Voccola said in the statement. "We understand that every second they are shut down, it impacts their livelihood, which is why we're working feverishly to get this resolved."
    Kaseya said that it has met with US government agencies including the FBI and the Cybersecurity and Infrastructure Security Agency (CISA). It said it had also engaged with the White House and cybersecurity firm FireEye Mandiant.


    The White House on Sunday urged companies who believe their systems were compromised in the ransomware attack that targeted Kaseya to immediately report it to the Internet Crime Complaint Center.
    Kaseya said that it had discussed "systems and network hardening requirements prior to service restoration" with the FBI and CISA. The company said that "a set of requirements" will be posted "to give our customers time to put these counter measures in place in anticipation of a return to service on July 6."
     
  2. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Western Digital offers free data rescue to intruder customers sweclockers.com | July 8,2021

    Owners of the storage units My Book Live and My Book Live Duo who have had their data deleted as a result of a security hole now have a chance to have it recreated free of charge.
     
    jclausius, Dr. AMK and Vasudev like this.
  3. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
  4. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    U.S., global allies condemn China for "malicious cyber activities"
     
    Vasudev, jclausius and Papusan like this.
  5. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    6,160
    Messages:
    3,265
    Likes Received:
    2,573
    Trophy Points:
    231
    Papusan, Dr. AMK and Vasudev like this.
  6. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Is Norton Planning to Kill Free Antivirus? pcmag.com | Aug 12, 2021

    NortonLifeLock is merging with Avast, which already owned AVG. Add this to Norton’s Purchase of Avira in 2020, and it looks like consolidation is running rampant. How worried should we be that the days of free antivirus are numbered?

    What Do Competitors Think?

    I sent out queries to Norton’s biggest competitors asking for comment on the coming merger. Not surprisingly, almost all of them cited company policy against commenting on mergers and acquisitions. Marcin Kleczynski, CEO of Malwarebytes, was a rare exception.

    “Consolidation in cybersecurity is natural, but not necessarily healthy for the industry or the end users,” said Kleczynski. ”The competition that exists in a diverse market landscape drives innovation and benefits all end users. The concern as large players like Norton begin to acquire free solutions is that truly free solutions may evaporate and many vulnerable populations will be forced to pay—or be left at the mercy of cybercriminals. This is why we always have offered a free solution for consumers.”

    Indeed, Malwarebytes Free is very popular as a cleanup tool after a malware attack. I’ve even had tech support agents from other security companies recommend it. But the free Malwarebytes product is not a full-fledged antivirus system, because it doesn’t include a real-time component to protect against future infestations.
     
    jclausius, Vasudev and Dr. AMK like this.
  7. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
    Last edited: Aug 17, 2021
  8. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Want Admin Privileges on Windows 10? Just Plug in a Razer Keyboard or Mouse pcmag.com

    Razer has now publicly responded to news of this vulnerability, with a spokesperson explaining:

    "We were made aware of a situation in which our software, in a very specific use case, provides a user with broader access to their machine during the installation process.

    We have investigated the issue, are currently making changes to the installation application to limit this use case, and will release an updated version shortly. The use of our software (including the installation application) does not provide unauthorized third-party access to the machine.

    We are committed to ensuring the digital safety and security of all our systems and services, and should you come across any potential lapses, we encourage you to report them through our bug bounty service, Inspectiv: https://app.inspectiv.com/#/sign-up."

    Original Story:
    Hardware company Razer is currently offering an easy way for anyone with physical access to a Windows 10 machine to gain admin privileges: Plug in a keyboard or mouse.

    As BleepingComputer reports, a security researcher who goes by the name jonhat on Twitter discovered a zero-day vulnerability made possible by Razer's peripherals. The vulnerability was disclosed to Razer, but the company didn't respond, so jonhat decided to go public and posted a video of the privilege escalation being carried out. You can see it in the tweet below, or watch a higher quality version on Streamable.

    SteelSeries bug gives Windows 10 admin rights by plugging in a device bleepingcomputer.com | Today

    The discovery comes after news broke over the weekend that the Razer Synapse software can be used to gain elevated privileges when connecting a Razer mouse or keyboard.

    upload_2021-8-25_15-15-9.png


    -----------------------------------------------------------------

    Hundreds of thousands of home Wi-Fi routers under attack — what to do tomsguide.com | Aug 24, 2021

    Chipset flaws dating back many years permit remote takeover

    Serious flaws have been found in hundreds of different models of home networking devices devices made and sold by at least 65 different companies, and cybercriminals are already attacking them. We've got a list of the vulnerable devices at the end of this page.

    ----------------------------------------------------------------

    Edit. Aug 30,2021

    PERIPHERALS FROM RAZER & ASUS UPDATE 2Driver installation grants admin rights

    The automatic driver installation via Windows Update allows attackers to gain admin rights with products from Razer and Asus.

    Update 08/30/2021 9:10 am Forum »
    Asus has also investigated the problem. In its statement sent to ComputerBase, the company rules out the possibility of the Armory Crate software granting its users administration rights during installation. In addition, an email address is given to which security gaps can be reported.
    We are aware of a few online articles claiming a potential security issue concerning ASUS Armory Crate.
    We would like to clarify that ASUS Armory Crate does not grant normal users System Admin permissions during the installation process.
    We take digital security and safety very seriously, and encourage users who encounter such issues to report it to the ASUS Customer Service team at [email protected]





     
    Last edited: Aug 30, 2021
    Vasudev, etern4l and jclausius like this.
  9. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
  10. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
  11. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Hmm. Looks like I have to download damn MSO updates for my 2016,2019 and 365.
     
    Papusan likes this.
  12. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Windows MSHTML zero-day exploits shared on hacking forums bleepingcomputer.com | September 12, 2021

    [​IMG]

    Threat actors are sharing Windows MSHTML zero-day (CVE-2021-40444) tutorials and exploits on hacking forums, allowing other hackers to start exploiting the new vulnerability in their own attacks.

    Last Tuesday, Microsoft disclosed a new zero-day vulnerability in Windows MSHTML that allows threat actors to create malicious documents, including Office and RTF docs, to execute commands on a victim's computer remotely.

    Even though there are no security updates available for the CVE-2021-40444 vulnerability, as it was discovered used in active attacks by EXPMOM and Mandiant, Microsoft decided to disclose the vulnerability and provide mitigations to help prevent its exploitation.

    These mitigations work by blocking ActiveX controls and Word/RTF document previews in Windows Explorer.

    However, researchers have been able to modify the exploit not to use ActiveX, effectively bypassing Microsoft's mitigations.
     
  13. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Yikes! I will patch the PC right away!
     
    Papusan likes this.
  14. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]

    SECURITY
    Millions of HP OMEN gaming PCs impacted by driver vulnerability bleepingcomputer.com | Sept 2021

    Millions of HP OMEN laptop and desktop gaming computers are exposed to attacks by a high severity vulnerability that can let threat actors trigger denial of service states or escalate privileges and disable security solutions.

    "While we haven’t seen any indicators that these vulnerabilities have been exploited in the wild up till now, using any OMEN-branded PC with the vulnerable driver utilized by OMEN Gaming Hub makes the user potentially vulnerable," SentinelOne warned.

    "Therefore, we urge users of OMEN PC’s to ensure they take appropriate mitigating measures without delay."
     
    jclausius, Vasudev and etern4l like this.
  15. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Netgear fixes dangerous code execution bug in multiple routers bleepingcomputer.com | Today

    Netgear has fixed a high severity remote code execution (RCE) vulnerability found in the Circle parental control service, which runs with root permissions on almost a dozen modern Small Offices/Home Offices (SOHO) Netgear routers.
     
  16. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Last edited: Sep 24, 2021
  17. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    SECURITY
    New UEFI bootkit used to backdoor Windows devices since 2012 bleepingcomputer.com | Oct 5, 2015
    A newly discovered and previously undocumented UEFI (Unified Extensible Firmware Interface) bootkit has been used by attackers to backdoor Windows systems by hijacking the Windows Boot Manager since at least 2012.

    Secure Boot doesn't really help
    Patching the Windows Boot Manager (bootmgfw.efi) requires for Secure Boot (which helps check if the PC boots using trusted firmware) to be disabled.

    As the researchers discovered, attackers have deployed the bootkit in the wild, which means they've found a method to toggle off Secure Boot on targeted devices.
     
  18. anytimer

    anytimer Notebook Virtuoso

    Reputations:
    302
    Messages:
    2,160
    Likes Received:
    321
    Trophy Points:
    101
  19. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
    Papusan and etern4l like this.
  20. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Research finds vulnerabilities in 97 percent of applications betanews.com
    [​IMG]
    Data from 3,900 tests conducted on 2,600 software or systems targets reveals that 97 percent had some form of vulnerability, 30 percent of the targets had high-risk vulnerabilities, and six percent had critical-risk vulnerabilities...
     
  21. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Last edited: Nov 22, 2021
  22. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Malicious KMSPico installers steal your cryptocurrency wallets bleepingcomputer.com

    Threat actors are distributing altered KMSpico installers to infect Windows devices with malware that steals cryptocurrency wallets.

    This activity has been spotted by researchers at Red Canary, who warn that pirating software to save on licensing costs isn't worth the risk.

    KMSPico is a popular Microsoft Windows and Office product activator that emulates a Windows Key Management Services (KMS) server to activate licenses fraudulently.

    According to Red Canary, many IT departments using KMSPico instead of legitimate Microsoft software licenses are much bigger than one would expect.

    "We've observed several IT departments using KMSPico instead of legitimate Microsoft licenses to activate systems," explained Red Canary intelligence analyst Tony Lambert.

    "In fact, we even experienced one ill-fated incident response engagement where our IR partner could not remediate one environment due to the organization not having a single valid Windows license in the environment."
     
  23. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Dell Windows drivers still allow kernel attacks
    Posted on December 19, 2021 by Günter Born

    users of Dell systems are at risk still that their Windows systems are compromised through Dell drivers through kernel attacks. The problem should be fixed by updates in May 2021. Rapid7 security researchers are now sounding the alarm that these security updates have not closed all vulnerabilities. Administrator privileges are required to install the drivers. But it looks like this approach is being used by cyber gangs for attacks. In the business environment, however, there are countermeasures....
     
    Vasudev likes this.
  24. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
    Papusan likes this.
  25. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Scary they have such a trust in Microsoft who have a bigger audience :confused:

    Microsoft Edge may be sending search information to Microsoft! Here is how you turn that off

    Microsoft Edge may send search results from any search that is run in the browser to Microsoft by default. The feature is not limited to Bing Search, it will inform Microsoft about searches on all search engines, including Google, DuckDuckGo, or StartPage, that users of Edge make, if the setting is enabled.

    A quick check of the setting revealed that Microsoft Edge turned it on, as it was turned off previously. The setting in question is called "Help improve Microsoft products by sending the results from searches on the web", and you find it in the privacy section.
     
  26. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
  27. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    New Malware Uses SSD Over-Provisioning to Bypass Security Measures tomshardware.com

    An almost perfect way to stealthily store malware

    Thankfully, these attacks were created by researchers and were not discovered by an actual attack. However, an attack like this could very well happen, so hopefully, SSD manufacturers will start patching these security vulnerabilities quickly before someone gets a chance to exploit them.
     
    6730b likes this.
  28. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Microsoft Defender weakness lets hackers bypass malware detection bleepingcomputer.com

    Threat actors can take advantage of a weakness that affects Microsoft Defender antivirus on Windows to learn locations excluded from scanning and plant malware there.

    Threat actors can take advantage of a weakness that affects Microsoft Defender antivirus on Windows to learn locations excluded from scanning and plant malware there.

    The issue has persisted for at least eight years, according to some users, and affects Windows 10 21H1 and Windows 10 21H2.

    Given that it's been this long and Microsoft has yet to address the problem, network administrators should consult the documentation for properly configuring Microsoft Defender exclusions on servers and local machines via group policies.

    upload_2022-1-13_21-27-59.png
    https://twitter.com/SecurityAura/status/1481107646082072577

    Yep, Microsoft really really want that you swap over to the new Win 11 touch friendly disaster.
     
    Last edited: Jan 13, 2022
  29. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Vasudev likes this.
← Previous page