Monday, April 14, 2014

Cyber Security News, Education and Cyber Vulnerability Report for the Week of April 14, 2014


Cyber Security News of the Week


From our friends at Citadel Information Group

Identity Theft

GAO: IRS has information security control weaknesses: The Internal Revenue Service continues to have weaknesses in information security control that the Government Accountability Office fears could affect the confidentiality, integrity and availability of financial and sensitive taxpayer data. FCW, April 9, 2014

Cyber Threat

Advanced Attacks Are The New Norm, Study Says: According to the Websense 2014 Threat Report, most malicious exploits now are advanced and targeted. DarkReading, April 4, 2014

Cyber Update

Adobe, Microsoft Push Critical Fixes: Adobe and Microsoft each issued updates to fix critical security vulnerabilities in their software today. Adobe patched its Flash Player software and Adobe AIR. Microsoft issued four updates to address at least 11 unique security flaws, including its final batch of fixes for Office 2003 and for systems powered by Windows XP. KrebsOnSecurity, April 8, 2014

Cyber Warning

Microsoft drops Windows XP support: Microsoft ended support of Windows XP on Tuesday, leaving the many still clinging to the outdated software exposed to cyberattacks. CNN, April 8, 2014
Hackers Lurking in Vents and Soda Machines: Unable to breach the computer network at a big oil company, hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. The New York Times, April 7, 2014

Cyber Defense — Heartbleed

Millions of Android Devices Vulnerable to Heartbleed Bug: Millions of smartphones and tablets running Google Inc. (GOOG:US)’s Android operating system have the Heartbleed software bug, in a sign of how broadly the flaw extends beyond the Internet and into consumer devices. BusinessWeek, April 11, 2014
FFIEC Issues Heartbleed Warning; Major Banks Say They’re Protected: As regulators told financial institutions Thursday to figure out fixes to a website software coding error that could put some online and mobile banking applications at risk, banks assured customers that their online sites are fine. A few lingering vulnerabilities may remain, however, in banks’ networks that will take time to find and patch. American Banker, April 11, 2014
Apple’s iOS, OS X don’t have Heartbleed bug but BBM for iOS and Android do: Apple iOS and OS X devices aren’t affected by the Heartbleed bug, but BlackBerry’s BBM and Secure Work Spaces are — and the company says it lacks a fix for the issue. ZDNet, April 11, 2014
Heartbleed Bug hits at heart of many Cisco, Juniper products: Network World – The Heartbleed Bug, a flaw in OpenSSL that would let attackers eavesdrop on Web, e-mail and some VPN communications, is a vulnerability that can be found not just in servers using it but also in network gear from Cisco and Juniper Networks. Both vendors say there’s still a lot they are investigating about how Heartbleed impacts their products, and to expect updated advisories on a rolling basis. NetworkWorld, April 10, 2014
Heartbleed bug: What you need to know: This week it has emerged that a major security flaw at the heart of the internet may have been exposing users’ personal information and passwords to hackers for the past two years. BBC, April 10, 2014
Heartbleed Bug: What Can You Do?: In the wake of widespread media coverage of the Internet security debacle known as the Heartbleed bug, many readers are understandably anxious to know what they can do to protect themselves. Here’s a short primer. KrebsOnSecurity, April 10, 2014
The Heartbleed Hit List: The Passwords You Need to Change Right Now: An encryption flaw called the Heartbleed bug is already being called one of the biggest security threats the Internet has ever seen. The bug has affected many popular websites and services — ones you might use every day, like Gmail and Facebook — and could have quietly exposed your sensitive account information (such as passwords and credit card numbers) over the past two years. Mashable, April 9, 2014
Half a million widely trusted websites vulnerable to Heartbleed bug: A serious overrun vulnerability in the OpenSSL cryptographic library affects around 17% of SSL web servers which use certificates issued by trusted certificate authorities. Already commonly known as the Heartbleed bug, a missing bounds check in the handling of the TLS heartbeat extension can allow remote attackers to view up to 64 kilobytes of memory on an affected server. This could allow attackers to retrieve private keys and ultimately decrypt the server’s encrypted traffic or even impersonate the server. NetCraft, April 8, 2014
Experts Find a Door Ajar in an Internet Security Method Thought Safe: A flaw has been discovered in one of the Internet’s key security methods, potentially forcing a wide swath of websites to make changes to protect the security of consumers. The New York Times, April 8, 2014
Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style: Lest readers think “catastrophic” is too exaggerated a description for the critical defect affecting an estimated two-thirds of the Internet’s Web servers, consider this: at the moment this article was being prepared, the so-called Heartbleed bug was exposing end-user passwords, the contents of confidential e-mails, and other sensitive data belonging to Yahoo Mail and almost certainly countless other services. ars technica, April 8, 2014

Cyber Security Management

Inside the NIST Framework to Improve Cybersecurity: President Obama’s Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” issued a year ago, established U.S. policy for maintaining a cyber environment that encourages “efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties.” The Order calls for a voluntary, risk-based cybersecurity framework. The National Institute of Standards and Technology (NIST) recently released the framework, a set of industry standards and best practices to help organizations manage cybersecurity risks. The NIST framework is not intended to replace existing processes, but to complement business and cybersecurity operations. Enterprises can use the framework as part of their processes for identifying, assessing and managing cybersecurity risk. An organization can overlay its current process onto the framework to find “gaps in its current cybersecurity risk approach and to develop a roadmap to improvement.” The framework is a collaboration between industry and government and consists of standards, guidelines and practices. For a copy of the framework, click here. CIO Insight, April 10, 2014

National Cyber Security

NSA Said to Exploit Heartbleed Bug for Intelligence for Years: The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said. Bloomberg, April 11, 2014

Cyber Law

Andrew Auernheimer’s computer hacking conviction is overturned by appeals court: A federal appeals court on Friday overturned the conviction of a prominent computer hacker whose imprisonment had highlighted a growing debate over whether the government is overreaching in its campaign against cybercrime. The Washington Post, April 11, 2014
Judge Says FTC Can Bring Enforcement Actions Regarding Corporate Data Security Practices: In a critically important data security case, a Federal District Court ruling on a motion to dismiss brought by Wyndham hotels, sided with the government in deciding that the Federal Trade Commission has authority under the unfairness prong of the FTC Act to bring enforcement actions to remedy unreasonable data security practices. Forbes, April 8, 2014

Cyber Sunshine

Man behind Carder.su racketeering, other cybercrime, pleading guilty: A Georgia man agreed to plead guilty to federal racketeering charges associated with the so-called Carder.su criminal enterprise that trafficked and manufactured stolen and counterfeit credit cards resulting in $50 million in losses globally. Ars Technica, April 9, 2014

Cyber Calendar

ISSA-LA Sixth Annual Information Security Summit, May 16, Universal City Hilton. Speakers include Richard Clarke, former Assistant to the President; Jackie Lacey, Los Angeles County District Attorney;Jeremiah Grossman, Founder & iCEO, WhiteHat Security; Marcus Ranum, CSO, Tenable; Marc Maiffret, CTO, Beyond Trust; Jim Manico, Secure Coding Instructor and Author, Global OWASP Board of Directors; Ira Winkler, ISSA International President; Andrea Hoy, ISSA International Vice-President. For more information and to register, visit ISSA-LA.

share on TwitterLike Weekend Vulnerability and Patch Report, April 13, 2014 on Facebook

Weekend Vulnerability and Patch Report, April 13, 2014


Heartbleed – Special Alert

Consumers
Websites you visit: You can check whether or not a website is vulnerable to Heartbleed at the following two websites:
The Mashable post provides Heartbleed information on an extensive list of sites, including social networks, companies with a large online presence, email providers, financial institutions and others.
If a site you regularly visit has been affected by Heartbleed, you should plan to change your password to the site after the site has been patched.
If a site you visit is not affected by Heartbleed, you need not do anything.
Android Users: Check your version of the Android Operating System. Version 4.1.1 has the Heartbleed flaw and will need to be updated. Contact the manufacturer or your carrier for more information. Follow this link for more information.
Home Routers: Your home router may contain the Heartbleed flaw. Check with your Internet service provider or the manufacturer.
Business: Check your web-sites, any instances of OWA or other web-based access users may have, VPNs, firewalls, routers and switches for the Heartbleed vulnerability and patch as needed. You will also need to get a new security certificate after patching.
For more information on Heartbleed and what to do about it, see our special Heartbleed Section in our Cyber Security News of the Week.

Important Security Updates

Adobe Flash Player: Adobe has released version 13.0.0.182 for its Flash Player to fix at least 4 highly critical vulnerabilities. Updates are available through the program or from Adobe’s Flash Web Site.
AVG Antivirus Free Edition: AVG has released version 2014.0.4355 (32-bit) of its Free Edition Antivirus. Updates are available through the program or from AVG’s website.
Dropbox: Dropbox has released version 2.6.27 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel's warning below]
Google Android OpenSSL: Google has released an update to fix two moderately critical vulnerabilities reported in previous versions of Android due to a bundled version of OpenSSL.  Google’s Online Security Blog reports that all versions of Android are immune to CVE-2014-0160 (Heartbleed) (with the limited exception of Android 4.1.1; patching information for Android 4.1.1 is being distributed to Android partners). Apply patch when available and contact your Android partner for more information.
Google Chrome: Google has released version 34.0.1847.116 of Chrome for Windows and Mac to fix 14 highly critical vulnerabilities. Updates are available through the program.
Google Chrome for Android: Google has released version 34.0.1847.114 of Chrome for Android to fix moderately critical unpatched vulnerabilities reported in previous versions. Updates are available through the program or device.
KeePass: KeePass has released version 1.27 of its open source password manager. Updates are available from the KeePass website.
Microsoft Patch Tuesday: Microsoft released 4 updates addressing at least 11 security vulnerabilities, some of which are highly critical, in almost all versions of the Microsoft OS, Internet Explorer, Office Publisher, Windows Flash and more, including its final batch of fixes for Office 2003 and for systems powered by Windows XP. Updates are available via Windows Update or from Automatic Update.

Current Software Versions

Adobe Flash  13.0.0.182 [Windows 7: IE]
Adobe Flash  13.0.0.182 [Windows 7: Firefox, Mozilla]
Adobe Flash  13.0.0.182 [Windows 8: IE]
Adobe Flash  13.0.0.182 [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader 11.0.06
Dropbox 2.6.27 [Citadel warns against relying on Dropbox security. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the Dropbox password be at least 15 characters long and different from other passwords.]
Firefox 28.0
Google Chrome 34.0.1847.116
Internet Explorer 11.0.9600.16518 [Windows 7: IE]
Internet Explorer 11.0.9600.16384 [Windows 8: IE]
Java SE 8 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
QuickTime 7.7.5
Safari 5.1.7 
Safari 7.0.2 [Mac OS X]
Skype 6.14.0.104

Newly Announced Unpatched Vulnerabilities

None
For an updated list of previously announced Unpatched Vulnerabilities, please see the resources section of Citadel’s website.

For Your IT Department

BlackBerry Multiple Products: Secunia reports that BlackBerry has two vulnerabilities due to a bundled version of OpenSSL. The vulnerabilities are reported in Link for Windows and MacOS, BBM for iOS and Android Secure Work Space for BES10 for iOS and Android. No official solution is currently available. For more information, see BlackBerry’s Knowledge Base.
Cisco Multiple Products: Secunia reports that Cisco has released updates for its Adaptive Security Appliance (ASA), ONS 15454 Series,  IOS XR and others. Apply updates.
Cisco Multiple Products OpenSSL: Secunia reports that Cisco has two moderately critical unpatched vulnerabilities in many products due to a bundled vulnerable version of OpenSSL, including Desktop Collaboration Experience DX650, IP Phone 7900 Series, MS200X Series Ethernet Access Switch, TelePresence Conductor, UCS B-Series Blade Servers, USC C-Series Rack Servers, Unified Ip Phones 7900, 8900, and 9900 Series, Universal Small Cell 5000 and 7000 Series, AnyConnect for iOS 3.x, TelePresence Video Communication Server (VCS), Unified Communications Manager 10.x, and WeEx Meetings Server 2.x. No official solution is currently available.
Citrix VDI: Secunia reports that Citrix has released updates for its VDI-in-a-box to fix a security issue reported in previous versions. Update to version 5.3.6 or 5.4.2.
McAfee Asset Manager: Secunia reports that McAfee has released updates for its Asset Manager to fix vulnerabilities reported in previous versions. Update to version 6.6.141.
McAfee Multiple Products OpenSSL: Secunia reports McAfee has moderately critical vulnerabilities in many products due to a bundled version of OpenSSL, including Security Information and Event Management (SIEM) versions 9.1.x, 9.2.x, and 9.3.x, Next Generation Firewall (NGFW) versions prior to 5.5.7, Firewall Enterprise version 8.3.2 prior to ePatch 14, Web Gateway versions 7.3.x and 7.4.x. Apply fixes.
VMware vSphere Client: Secunia reports that VMware has released updates for its vSphere Client to fix vulnerabilities. Apply updates.
If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2014 Citadel Information Group. All rights reserved.


SecurityRecruiter.com's Security Recruiter Blog