Last Week In Blockchain and Cybersecurity News – January 14, 2020

56.25M US Residents’ CheckPeople Records Exposed on Chinese Server

Data from CheckPeople, a subscription-based service that allows users to search for certain information of other individuals, was recently exposed on a server with a Chinese IP address. The leaked data includes names, home addresses, phone numbers, ages, names of relatives, criminal records, and more. The archive was stored on a NoSQL database of metadata linking to CheckPeople.com.

Further investigation showed that the archive of data belongs to an IP address utilized by Alibaba’s web hosting company in Hangzhou, China. The data itself is not sensitive; however, having all the information in one place provides easy access for scammers, phishers, and other malicious actors to download it in bulk and conduct nefarious actions with it. The mass amount of data can also have negative consequences in combination with more sensitive information.

Read more here

PoC Exploits Released for Citrix ADC and Gateway RCE Vulnerability – Over 80,000 Vulnerable to Attacks

For almost a month, Citrix Application Delivery Controllers (ADC) and Citrix Gateways have been vulnerable to a critical path traversal flaw (CVE-2019-1978). The flaw allows an unauthenticated entity to perform arbitrary code execution on vulnerable servers.

It affects all versions of the software, including:

  • Citrix ADC and Citrix Gateway version 13.0 all supported builds

  • Citrix ADC and NetScaler Gateway version 12.1 all supported builds

  • Citrix ADC and NetScaler Gateway version 12.0 all supported builds

  • Citrix ADC and NetScaler Gateway version 11.1 all supported builds

  • Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds

Citrix’s announcement of the flaw did not include any security patches; however, they offered mitigation steps to help system administrators guard their server against attacks.

According to Shodan, and other online-monitoring tools, over 80,000 Citrix ADC or Gateway servers are publicly accessible and exploitable due to the flaw.

As multiple groups have released proof-of-concept exploit code (Tool1Tool2) for the vulnerability, it’s likely that thousands of attackers will begin to exploit vulnerable servers.

Read more here

Hundreds of Millions of Cable Modems Are Vulnerable to New Cable Haunt Vulnerability

Cable Haunt, a new security flaw impacting cable modems that use Broadcom chips, is believed to affect over 200 million cable modems throughout Europe. The flaw resides in a standard component in Broadcom chips, named a spectrum analyzer. A spectrum analyzer protects against signal surges and disturbances coming from a coax cable.

According to a team of Danish security researchers, the Broadcom chip spectrum analyzer lacks security in various areas, including default credentials, a programming error in its firmware, and a lack of protection against DNS rebinding attacks.

According to the security researchers and ZDNet, an attacker can use Cable Haunt to:

  • Change the default DNS server

  • Conduct remote man-in-the-middle attacks

  • Hot-swap code or even the entire firmware

  • Upload, flash, and upgrade firmware silently

  • Disable ISP firmware upgrade

  • Change every config file and settings

  • Get and set SNMP OID values

  • Change all associated MAC addresses

  • Change serial numbers

  • Be exploited in botnet

white paper and a dedicated website were published by the security researchers, which contains further information about Cable Haunt.

The researchers have also provided proof-of-concept code that ISP users can implement to test their routers Cable Haunt attack vulnerabilities.

Get more information here

New York Man Sentenced in ATM Skimming Conspiracy

Bogdan Rusu has been sentenced to five years in prison for orchestrating an elaborate ATM skimming campaign, allowing him to gather $390,141 from numerous victims. According to the Department of Justice press release, Bogdan pled guilty to participating in the scheme and stated that he used card-reading devices with pinhole cameras throughout New Jersey, Massachusetts, and New York bank locations.

Once Rusu stole customer information and other data, he would then transfer the information to counterfeit payment cards which could steal money from the victims.

The case also introduced a larger ATM skimming scheme that involved over 11 individuals. The crooks were able to collect more than $868,000 from multiple accounts.

Read more here

Nemty Ransomware to Start Leaking Non-Paying Victims’ Data

To punish victims who refuse to pay their ransom, Nemty ransomware is implementing a tactic started by the Maze and Sodinokibi ransomware gangs.

Traditionally, ransomware groups encrypt files within an organization and demand a ransom to decrypt the data. Recently though, ransomware groups, including Nemty, have been stealing files before they encrypt them. And if a victim doesn’t pay the ransom, the ransomware releases small pieces of stolen data online until the victim makes payment.

Nemty plans to develop a blog website that publishes all stolen information from ransomware victims that reject the given ransom.

BleepingComputer

BleepingComputer

Read more here

Leave a Reply

Your email address will not be published.