IT NEWS

City: Skylines developers warn of rogue mod

Players of the popular city-building simulator and video game City: Skylines need to check devices for rogue code lurking in mods related to a rework of something called Harmony, essential for modding across several titles.

The threat arrives in a broader landscape—video game modding—already known for scams and malware. Whether looking for patches and fixes, or just more general alterations, gamers have to be careful when modifying how their games run. There’s a few long-standing sources for game modders, viewed as being safer than other ways of grabbing the latest mod. Even then, problems can arise due to site aspects unrelated to the mod files themselves.

That’s just how it goes in modification land.

What is Harmony?

Harmony is a “library for patching, replacing and decorating .NET and Mono methods during runtime”. As with many things mod related, people occasionally go off and make their own versions of mods, frameworks, individual files, the works. Sometimes it’s better, sometimes it’s worse. Occasionally it’s a necessity if a game has changed so much the original no longer works, and the author has abandoned the project. Of course, sometimes people do this without asking permission if needed first which is a whole other can of worms.

This particular can of worms is exclusively rogue file related.

A statement of (bad) intent

From the game developers:

In TM:PE 11.6.4.8 we are marking _all_ mods by Chaos / Holy Water / drok (same person) as incompatible for the following reasons:

  • Network Extensions 3 contains malware which directly targets multiple members of our team, dozens of other modders, employees of Colossal Order, and dozens of Steam users many of whom will not be aware that they are targets of malware.
  • While the malware is trivial (it randomly alters speed limits), it’s caused a lot of excess support workload and raises concerns about what other malware may be present (particularly in the Harmony “Redesigned” mod).
  • Network Extensions 3 was modified with “tripwire” code specifically designed to cause bugs in other mods.
  • Those bugs are affecting TM:PE users (we have several confirmed cases) and when TM:PE team go in to investigate we are hit by malware.
  • Upon bugs appearing in other mods, Chaos claims that they are badly written in order to gain more users for his mods – which in turn are designed to cause bugs in other mods.
  • Chaos has blocked former members of Network Extensions mod, including myself, from creating derivative works on his version of the mod.
  • Chaos has added code to his Harmony “redesigned” mod’s reporting tool which is highly misleading (often indicating the wrong mod being responsible for an error, when in most cases it’s _affected_ by an error from somewhere else)
  • Chaos is doxing and harrassing anyone who calls him out on his behaviour, adding them to his targeted malware system, and then claiming that _he_ is the actual victim (a technique called “DARVO” = deny, attack, reverse victim and offender)

In the interim there is a high likelihood that Holy Water will release his own version of TM:PE. It’s not our place to tell you which mods to use, but at least wait for the additional detail before making a decision.

What’s the short version?

To summarise, from the same thread (bold added by me):

  • When someone starts the game with the NExt3 mod enabled, it checks if the game is running in Steam portal and, if so, then checks the player’s Steam ID against two lists of Steam IDs[github.com].
  • One of the lists appears to be mostly modders and CO employees; the other is a list of ordinary steam users many of whom will not be aware that they are direct targets of malware.
  • If the player ID matches an entry on the list, the mod proceeds to change road speeds to a random – but always slow – value[github.com].
  • This gives the false appearance that it’s the other mods which contain bugs – a topic which I’ll cover in a later comment.

This is quite the attempt at discrediting rival mods, while also taking a peculiar swing at developers and what seem to be random Steam users. Have they annoyed the mod creator in some way? Or are they genuinely just random City: Skylines players? At any rate, this plus word of some sort of automatic updater thrown into the mix has made players and developers very wary at time of writing.

Rogue mods down, and hopefully out

The mods have apparently since been removed from the Steam Workshop by Valve. As many as 35,000 people may have subscribed to the rogue files before being taken down. Anyone who may have grabbed this version of Harmony is advised to unsubscribe to the mod, and then run full security checks and malware scans as a precaution.

It’s hoped that the aggravating speed up / slow down “feature” of the mod is about as bad as things get for anyone affected, but an abundance of checking won’t hurt at this stage.

Usually we warn about suspicious standalone mods from sites you’ve never seen before, or files on sites such as Nexus Mods with bad reputations and poor reviews. It’s a little unusual to have to warn about bogus mod actions offered up directly from the Steam Workshop, but sadly that’s how things are sometimes. Keep an eye on developer commentary, read reviews before downloading, and keep your security scanners handy before allowing unknown code to run on your PC. Stay safe and have a hopefully malware-free time of it while modding your games.

The post City: Skylines developers warn of rogue mod appeared first on Malwarebytes Labs.

Twitter cans 2FA service provider over surveillance claims

Twitter is transitioning away from from its two-factor authentication (2FA) provider, Mitto AG, a Swiss communications company.

The social media giant broke the news to US Senator Ron Wyden of Oregon. It is noted that Twitter’s decision to move away from Mitto AG came after allegations that its co-founder and Chief Operating Officer, Ilja Gorelik, sold access to Mitto’s networks to surveillance technology firms. Talking to Bloomberg, an aide close to Wyden said that Twitter cited media reports as a significant factor for its decision.

In December, Bloomberg reported that Gorelik had sold access to Mitto’s networks between 2017 and 2018. The companies that bought the access reportedly used it to help governments conduct secret surveillance against users through their phones.

Mitto AG is a top provider in its industry and boasts a roster of big-named clients like Alibaba, Google, LinkedIn, Telegram, Tencent, TikTok, and WhatsApp. Representatives of the company have told its clients that Gorelik departed the company after these allegations arose. It isn’t clear if Gorelik left of his own accord or was pressured.

As of this writing, Twitter has yet to name a new 2FA provider.

So where does that leave Twitter users who use SMS 2FA? Although Twitter hasn’t hinted at temporarily suspending this particular option, users may opt to use two other forms of 2FA on offer: An authentication app or a security key. Twitter has a ready help page here on how to sign up.

The curious case of Mitto AG

While many may have been shocked by events involving Mitto, critics argue that the mobile industry has been known for such abuses for years.

“For years mobile industry organizations such as the GSMA have been aware of operators selling network access resulting in targeted surveillance,” Gary Miller, a mobile security researcher at Citizen Lab, told Bloomberg. “The lack of regulation and accountability has brought unnecessary privacy and security risks to mobile users across the globe.”

The GSMA is an organization that represents the interests of the mobile industry with groups/chapters all around the globe. When interviewed about the Mitto case, a spokesperson from the group said that GSMA “takes network security and privacy very seriously and plays a leading role in creating a safer experience for mobile subscribers.”

Dario Betti, CEO of the Mobile Ecosystem Forum, of which Mitto is a member, didn’t comment on the Mitto case but said in a broader context that abuses pose “a threat to the market and the market has to close down all these bad behaviors.”

“This is an industry built on trust, and we need to maintain that trust,” he added.

The post Twitter cans 2FA service provider over surveillance claims appeared first on Malwarebytes Labs.

The world’s most coveted spyware, Pegasus: Lock and Code S03E04

Two years ago, the FBI reportedly purchased a copy of the world’s most coveted spyware, a tool that can remotely and silently crack into Androids and iPhones without leaving a trace, spilling device contents onto a console possibly thousands of miles away, with little more effort than entering a phone number.

This tool is Pegasus, and, according to recent reporting from The New York Times, the FBI purchased the tool for examination, but deferred from using it for any real investigations. Remarkably, at the same time, the US government was also considering a version of Pegasus that could allow for domestic spying on Americans—a new, upgraded Pegasus called “Phantom.”

Pegasus and Phantom were reportedly never deployed by the US government, but that doesn’t mean that these invasive hacking powers are rarely used. In fact, Pegasus has been sold to the governments of India, Saudi Arabia, Bahrain, Azerbaijan, Mexico, the United Arab Emirates, Morocco, Hungary, and Rwanda.

In the hands of those and many other countries, surveillance abuses abound.

On Lock and Code today, host David Ruiz provides an in-depth look at Pegasus: Who makes it, how much information can steal from mobile devices, how does it get onto those devices, and who has been provably harmed by its surveillance capabilities? Despite being billed as a tool to help curb criminal organizations and terrorist threats, Pegasus, through forensic analyses, has been found on the phones of journalists, human rights activists, and political dissidents. It is believed to have been used to target several heads of state, including presidents and prime ministers, along with nonprofit directors, lawyers, and at least one government scientist.

“These aren’t stories of investigating, or preventing, or solving, or addressing criminal activities. These are stories of the everyday people, with names, with careers, with families, who did something—who spoke up in a way, who lived in a way—that someone else didn’t like.”

David Ruiz, Lock and Code host, Malwarebytes online privacy advocate

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

The post The world’s most coveted spyware, Pegasus: Lock and Code S03E04 appeared first on Malwarebytes Labs.

Online Safety Bill will legally require porn sites to verify users’ age

When Ioannis Dekas, a father of four boys, found that one of his sons had access to pornography, he and his wife became concerned.

“In two weeks leading up to this moment, we’d noticed a drastic change in his behavior,” Dekas said in a BBC interview, “Withdrawal, a sense of anger towards his siblings, we could sense frustration in his life.” And when the couple talked to their son, they found that his peers were pressuring him to be familiar with the language of porn.

Since then, he has been campaigning for the UK government to implement the “proof of age” access to pornography, covered by the Digital Economy Act (DEA) 2017. However, DEA 2017 suffered from a series of delays and amendments, before being abandoned entirely in October 2019. According to then Culture Secretary Nicky Morgan, the government wanted to focus on a new bill that would protect children in a broader scheme of regulations based on the government’s Online Harms White Paper.

“This course of action will give the regulator discretion on the most effective means for companies to meet their duty of care,” Morgan was quoted saying. She also stressed that the government was still open to using age verification tools in the future. “The government’s commitment to protecting children online is unwavering. Adult content is too easily accessed online, and more needs to be done to protect children from harm.”

Enter the Online Safety Bill

The Online Safety Bill, which is touted as one of the UK government’s landmark bills, is poised, essentially, to regulate online content in the UK—global implications notwithstanding. It contains legislation that revives the plan to age-lock access to pornography by legally requiring porn sites to carry out age checks. This means that online porn users in the UK—estimated to be around 20-25 million people—would have to prove they are of legal age to view pornographic material by sharing their credit card to porn sites, or by having a third-party service confirm their legal age.

Ofcom, the regulator chosen by the UK government, will be able to fine porn sites up to 10% of their global earnings or block them from being accessed by anyone in the UK. The Online Safety Bill could also hold pornography site owners criminally liable for failing to follow the legislation.

As of this writing, the bill is in draft but is expected to be turned over to parliament in the coming months.

Many children’s safety groups have been asking for regulation surrounding age verification on porn sites, fueled by fear that minors could easily access it. And they have reason to be afraid. According to research by the British Board of Film Classification in 2020, half of children (51 percent) aged 11 to 13 years have seen porn. The report also reveals that children as young as seven sometimes stumble upon porn by accident.

“It is easy for children to access pornography online,” says Digital Minister Chris Philip, “Parents deserve peace of mind that their children are protected online from seeing things no child should see.”

Andy Burrows, head of child safety online policy at the NSPCC (National Society for the Prevention of Cruelty to Children), is quoted saying: “It’s right the government has listened to calls to fix one of the gaps in the Online Safety Bill and protect children from pornography wherever it’s hosted.”

“Crucially, they have also acted on our concerns and closed the ‘OnlyFans loophole’ that would have let some of the riskiest sites off the hook despite allowing children access to extremely damaging material.”

“But the legislation still falls short of giving children comprehensive protection from preventable abuse and harmful content and needs significant strengthening to match the government’s rhetoric and focus minds at the very top of tech companies on child safety.”

As of this writing, the bill already has in scope most destinations where children might be exposed to pornography. These include search engines, popular adult sites, social media platforms, and video-sharing platforms. Previously, only commercial sites with provisions for user-generated content—those that allow users to upload their content—were in the scope of the bill.

Protecting children from harmful content online is a noble cause; however, not everyone is rallying behind the idea of age verification measures.

The harm to privacy

Many see the act of sharing sensitive information with pornography sites as a security and privacy risk. Age verification requires a database of who has asked for permission to view what porn (and possibly credit card details). The complexities invovled may also encourage pornographic websites to outsource age verification to third-parties, resulting in fewer, larger, more comprehensive databases, which are of great potential value to criminal hackers or unscrupulous operators.

Jim Killock, the Open Rights Group executive director, said that age verification companies would benefit from this bill, but that it offers “little practical benefit for child safety, and much harm to people’s privacy.”

“There is no indication that this proposal will protect people from tracking and profiling porn viewing,” Killock said in a BBC interview.

Alec Muffet, a widely known internet security evangelist, penned a response to the drafts of Guidance on Age-Verification Arrangements and Guidance on Ancillary Service Providers back in 2018. These drafts proposed a similar age-verification process. Muffet expressed deep concern over “the lack of regulatory oversight, and the lack of standards regarding the operational and functional aspects of data and information security,” further stating that these will inevitably cause irreparable damage to UK users’ privacy.

“This does not appear to offer proportionate protection for this character of data, especially at the scale of millions of Britons in a handful of weakly-regulated, ‘homebrew’-secured, databases; we are thereby setting the stage for another ‘Ashley Madison’-like data breach, which in that case led to the suicide of several people because of the nature and sensitivity of the information leaked,” Muffet further noted. You can read more about the other concerns he raised in his Medium post.

The Society for Computers and Law (SCL) highlighed another high risk that comes with introducing age verification in pornography sites before the Digital Economy Act 2017 was abandoned: “It’s not only public figures who stand to suffer in the event of a large-scale porn data breach. The most marginalised members of society also have a lot to fear. The kind of sex we like to have, and fantasise about having, can have extraordinarily high stakes for those experiencing homophobia and transphobia. LGBTQ people who are not out to their families stand to lose their homes and their relationships; in the case of young or vulnerable people, this poses a very real risk to their survival. Being outed is also dangerous for members of the BDSM community—there are no laws protecting the rights of people into BDSM from discrimination, and in this country your private sexual practices can get you fired.”

The post Online Safety Bill will legally require porn sites to verify users’ age appeared first on Malwarebytes Labs.

Update now! Apple fixes actively exploited zero-day

Apple has released a security fix for a zero-day vulnerability (CVE-2022-22620) that it says “may have been actively exploited.” According to the security update information provided by Apple the vulnerability exists in WebKit—the HTML rendering engine component of its Safari browser—and can be used by an attacker to create web content that may lead to arbitrary code execution.

Apple says it has addressed this vulnerability with improved memory management in iOS 15.3.1, iPadOS 15.3.1, macOS Monterey 12.2.1, and Safari 15.3.

Vulnerability

The vulnerability is a use-after-free (UAF) issue in WebKit that could lead to OS crashes and code execution on compromised devices. Use after free (UAF) is a type of vulnerability that results from the incorrect use of dynamic memory during a program’s operation. If, after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

This issue can be exploited when WebKit processes HTML content. The attacker can exploit this vulnerability by luring users to visit a specially crafted web page. Once the user opens the malicious web page, an attacker can remotely execute malicious code on the targeted system. The vulnerability has been reported publicly as being exploited in the wild and was reported by an anonymous researcher.

WebKit is the browser engine that powers Safari on Macs as well as all browsers on iOS and iPadOS (browsers on iOS and iPadOS are obliged to use it). It is also the web browser engine used by Mail, App Store, and many other apps on macOS, iOS, and Linux.

Affected devices

Users owning the following devices should install the update as soon as possible:

  • iOS 15.3.1 and iPadOS 15.3.1 can be found on iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).
  • macOS Monterey 12.2.1 for all systems running macOS Monterey (MacBooks, iMacs, Mac minis, and Mac Pros)
  • All devices running macOS Big Sur and macOS Catalina which are using Safari.

Stay safe, everyone!

The post Update now! Apple fixes actively exploited zero-day appeared first on Malwarebytes Labs.

A new Magecart campaign is making waves

Malwarebytes’ researchers are closely monitoring web skimmers and have noticed that one of the infamous Magecart groups is causing a rise in the number of attacks while gobbling up over a quarter of the total number of attacks in one campaign.

What all these attacks have in common is the domain where the malicious javascript is hosted: naturalfreshmall.com. Additional research by Sansec shows a mass breach of stores running the Magento 1 ecommerce platform that can be tied to this campaign.

Magento

Magento is an Adobe company that offers a hosted and self-hosted content management system (CMS) for web shops. The free version of Magento is open source which offers users the option to make their own changes and allows specialists to create extensions for the CMS.

Magento 1 has reached end-of-life (EOL) and has not been supported since June 30, 2020. However, the platform is still in use by thousands of online stores. And because there’s a lack of security patches from Adobe, some are using community-provided patches. As you can imagine, the lack of vendor provided patches makes stores running Magento 1 popular victims for skimmers like Magecart.

Magecart

Magecart was originally one group that was partly named after the platform they concentrated on (Magento). But Magecart is no longer just one threat actor. We’ve seen several groups that are all specialized in cyberattacks involving digital credit card theft by skimming online payment forms. Magecart mainly targets e-commerce websites, aiming to inject JavaScript skimmers on checkout pages.

From a research standpoint, we have observed certain shifts in the scope of attacks. For instance, different threat actors are continuing to expand and diversify their methods and infrastructure. In a blog post about Magecart Group 8, we documented some of the web properties used to serve skimmers and exfiltrate stolen data.

In recent news we reported about the Segway online store that was compromised by Magecart group 12 who embedded the skimmer code inside a favicon.ico file.

The attack

According to the Sansec research the skimmers abused a known leak in the Quickview plugin that is typically used to inject rogue Magento admin users. In this case, the skimmers used it to add a validation rule that they could later trigger by registering as a customer. In investigated cases the attacker left no less than 19 backdoors on the system.

Keeping your site safe

We have written an extensive post about how to defend your website against skimmers, but in summary, here’s what you need to do to keep your site safe:

  • Make sure that the systems from where the site is administered are clean of malware.
  • Use strong passwords and do not reuse them.
  • Limit the number of administrators.
  • Keep your site’s software updated.
  • Use a Web Application Firewall (WAF).
  • Know that each dependency is a potential backdoor into your web pages.
  • Use a Content Security Policy (CSP).
  • Make sure you are made aware in case of problems, either by checking yourself or by having it done for you.

Stay safe, everyone!

The post A new Magecart campaign is making waves appeared first on Malwarebytes Labs.

Ransomware author releases decryption keys, says goodbye forever

If you’re unfortunate enough to be caught out by ransomware, the consequences can be devastating. You may be able to get rid of the infection, but the all-important files affected by such an attack will still be under lock and key. Without backups, which is more common than you may think, the files may be gone forever.

A tiny slice of good fortune

Occasionally, we all catch the proverbial break. Files can sometimes be recovered in the following ways:

  • A ransomware author makes some sort of mistake, or their files are just simply coded badly. Researchers figure out a way to recover the decryption key, and publish it so victims can recover their files.
  • Authors offer up the keys themselves. This can be for a variety of reasons. They may have generated a bit too much heat, and are looking to retreat into the shadows with the suggestion of some good deed done. Other times, they decide “party’s over” with the release of a new variant and hand out a “Get out of jail free” pass to former victims.

This is where our current story picks up.

What a maze

Back in 2019, Maze Ransomware came to light:

Initially, it grabbed victims via fake Cryptocurrency site traffic bounced to exploit kit landing pages. It also claimed to vary ransom amounts depending on if the compromised machine was a workstation, home computer, or server.

Tactics changed a little later on, with threats of exfiltrated data being published if ransom demands were not met. The group behind Maze eventually announced retirement, and infection numbers tailed off after one final flourish in August 2020. Maze affiliates quickly moved over to Egregor, which was then mired in the mud of several arrests.

Now we’re at the beginning of 2022, and there’s yet more developments in Maze land.

We’re finished…again

Someone has posted to the Bleeping Computer forums, claiming to be the developer of not only Maze, but also Egregor and Sekhmet ransomware families. The post reads as follows:

Hello, It’s developer. It was decided to release keys to the public for Egregor, Maze, Sekhmet ransomware families.

also there is a little bit harmless source code of polymorphic x86/x64 modular EPO file infector m0yv detected in the wild as Win64/Expiro virus, but it is not expiro actually, but AV engines detect it like this, so no single thing in common with gazavat. Each archive with keys have corresponding keys inside the numeric folders which equal to advert id in the config.

In the “OLD” folder of maze leak is keys for it’s old version with e-mail based. Consider to make decryptor first for this one, because there were too many regular PC users for this version.

There is, once more, a claim that anyone involved is now definitely out of the Ransomware game for good. All the “source code of tools” are also supposedly gone forever.

The forum poster included a zip containing decryption keys for the ransomware, and also some source code for malware used by the Maze gang.

What’s the real reason for this farewell to arms?

An interesting gesture, but more so from a “making an announcement” point of view than “fixing my ransomware-laden PC point of view”. Decryption tools already exist for the 3 groups mentioned, so adding these keys to the post is perhaps not that necessary. Indeed, the zip file has already been removed due to the inclusion of the malware source code.

The author claims this forum post and announcement is not related to any arrest or takedown, but even so this feels more important as an announcement of leaving the malware realm than being particularly helpful to victims.

Are they gone for good, or will they return once more with a new set of Ransomware files? Only time will tell…

The post Ransomware author releases decryption keys, says goodbye forever appeared first on Malwarebytes Labs.

SAP customers are urged to patch critical vulnerabilities in multiple products

German enterprise software maker SAP has patched three critical vulnerabilities affecting Internet Communication Manager (ICM), a core component of SAP business applications. Customers are urged by both SAP and CISA to address these critical vulnerabilities as soon as possible.

On February 8, SAP released 14 new security notes and security researchers from Onapsis, in coordination with SAP, released a Threat Report describing SAP ICM critical vulnerabilities, CVE-2022-22536, CVE-2022-22532, and CVE-2022-22533. Onapsis also provides an open source tool to identify if a system is vulnerable and needs to be patched.

CVE-2022-22536

The most important vulnerability in this report is CVE-2022-22536, one of the ICMAD vulnerabilities. The ICMAD vulnerabilities are particularly critical because the issues exist by default in the SAP Internet Communication Manager (ICM). The ICM is one of the most important components of a SAP NetWeaver application server and is present in most SAP products. It is a critical part of the overall SAP technology stack, connecting SAP applications with the Internet.

CVE-2022-22536 is a request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher. This vulnerability scored a CVSS rating of 10 out of 10. The high score is easy to explain. A simple HTTP request, indistinguishable from any other valid message and without any kind of authentication, is enough for a successful exploitation of the vulnerability.

Other vulnerabilities

Some of the other “high scorers” are Log4j related vulnerabilities, and a security update for the browser control Google Chromium delivered with SAP Business Client. The other two ICMAD vulnerabilities identified as CVE-2022-22532 and CVE-2022-22533 received scores of 8.1 and 7.5, respectively.

Scan tool

On GitHub Onapsis published a Python script that can be used to check if a SAP system is affected by CVE-2022-22536.

A Shodan scan shows there are more than 5,000 SAP NetWeaver servers currently connected to the Internet and exposed to attacks until the patch is applied.

Mitigation

SAP and Onapsis are currently unaware of any customer breaches that relate to these vulnerabilities, but strongly advise impacted organizations to immediately apply Security Note 3123396 (which covers CVE-2022-22536) to their affected SAP applications as soon as possible.

The Cybersecurity & Infrastructure Security Agency (CISA) warned that customers who fail to do so will be exposing themselves to ransomware attacks, the theft of sensitive data, financial fraud, and disruption or halt of business operations.

The post SAP customers are urged to patch critical vulnerabilities in multiple products appeared first on Malwarebytes Labs.

Microsoft: Slow MFA adoption presents “dangerous mismatch” in security

Multi-factor authentication (MFA) has been around for many years now, but few enterprises have fully embraced it. In fact, according to Microsoft’s inaugural “Cyber Signals” report, only 22 percent of all its Azure Active Directory (AD) enterprise clients have adopted two-factor authentication (2FA), a form of MFA. That leaves 78 percent that only require usernames and passwords to authenticate account users.

A 22 percent adoption rate is meager, especially in the face of the multiple online threats that enterprises face daily. For example, from January to December 2021, Microsoft detected a jaw-dropping 25.6 billion account hijacking attempts using brute-forced stolen passwords. Other cybercrimes that specifically target accounts are spear phishing, social engineering attacks, and password sprays—basic password attack tactics that nation-states carry out against target companies and governments.

There’s low MFA adoption elsewhere, too

Microsoft is not the only company to reveal that internet users have been reluctant to adopt MFA.

In July 2021, Twitter disclosed in its transparency report that only 2.5 percent of its active users have “at least one 2FA method enabled”. Most of those using 2FA have at least SMS authentication (77.7 percent) enabled, and a portion has enabled the option of using an authentication app (30.1 percent). Although that’s an improvement on the previous report, MFA adoption remains low overall.

Google introduced 2FA to Gmail in 2011. Seven years later, in the words of The Register, “virtually no one is using it.” This claim was backed up by Grzegorz Milka, a Google software engineer who presented at the Usenix’s Enigma 2018 security conference. Milka revealed that, at the time of his talk, less than 10 percent of Google accounts used 2FA.

Low MFA adoption is also common for developers. Npm stands for Node Package Manager. It’s a widely used JavaScript package manager and the largest repository of computer programming packages on the Internet. According to ZDNet, only 9.27 percent of npm developers use 2FA to secure their accounts. So, if attackers successfully compromise the accounts of these developers, they could freely plant malicious code into packages primarily used by other software developers worldwide.

MFA adoption struggles are real

Whenever we ask why there’s low MFA adoption, the overall reason is that change is hard and it’s inconvenient.

To encourage users to enable MFA on their accounts, making it easy for them is key. Google and Twitter have already changed their MFA features to make them more straightforward and user-friendly. And while this is a great move, we expect (and encourage) these big organizations to make it mandatory for all users to have MFA enabled.

The risks are just too high for a little bit of inconvenience.

The post Microsoft: Slow MFA adoption presents “dangerous mismatch” in security appeared first on Malwarebytes Labs.

Update now! Firefox and Adobe updates are more critical than Microsoft’s

The most critical updates for this “Patch Tuesday” come from Firefox and Adobe. While Microsoft addresses 70 vulnerabilities in its February 2022 Patch Tuesday release, none of them are ranked as critical. Firefox and Adobe however have fixed a few issues that could be qualified as critical.

Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). Let’s have a look at the ones that jumped out at us.

Firefox

Mozilla fixed a dozen security vulnerabilities in its Firefox browser. The two most important ones are both permissions issues:

  • CVE-2022-22753 A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access. This bug only affects Firefox on Windows. Other operating systems are unaffected.
  • CVE-2022-22754 If a user installs an extension of a particular type, the extension could have auto-updated itself and, while doing so, bypass the prompt which grants the new version the new requested permissions.

Two other vulnerabilities were classified as high. Those two are both memory safety bugs that with enough effort could have been exploited to run arbitrary code. These vulnerabilities were found by Mozilla developers.

Adobe

Adobe released updates to fix 17 CVEs affecting Premiere Rush, Illustrator, Photoshop, After Effects, and Creative Cloud Desktop. Of these 17 vulnerabilities, five are rated as critical.

  • CVE-2022-23203 A buffer overflow vulnerability that could lead to arbitrary code execution in Photoshop 2021 and Photoshop 2022 for Windows and macOS.
  • CVE-2022-23186 An out-of-bounds write vulnerability that could lead to arbitrary code execution in Illustrator 2021 and Illustrator 2022 for Windows and macOS.
  • CVE-2022-23188 A buffer overflow vulnerability that could lead to arbitrary code execution in Illustrator 2021 and Illustrator 2022 for Windows and macOS.
  • CVE-2022-23200 An out-of-bounds write vulnerability that could lead to arbitrary code execution in Adobe After Effects 18.4.3, 22.1.1 and earlier versions for Windows and macOS.
  • CVE-2022-23202 Uncontrolled search path element vulnerability that could lead to arbitrary code execution in the Creative Cloud Desktop Application installer 2.7.0.13 and earlier versions on Windows.

Microsoft

Even though no Microsoft vulnerabilities were listed as critical, there are a few that deserve some attention.

  • CVE-2022-21989 a Windows Kernel elevation-of-privilege vulnerability. According to the Microsoft advisory, successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. But in such a case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.
  • CVE-2022-21996 a Win32k elevation of privilege vulnerability listed as more likely to be exploited. The exploitation is known to be easy. The attack may be initiated remotely, but requires simple authentication for exploitation.
  • CVE-2022-22005 a Microsoft SharePoint Server Remote Code Execution vulnerability. The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability. This permission however is often present for an authenticated user.
  • CVE-2022-21984 a Windows DNS Server Remote Code Execution vulnerability. The server is only affected if dynamic updates are enabled, but this is a relatively common configuration. An attacker might take control of your DNS and execute code with elevated privileges if you have this set up in your environment.

Given the amount of available stolen login credentials, organizations shouldn’t disregard the vulnerabilities that require authentication, especially where it concerns public-facing servers. We hope this quick summary makes it easier for you to prioritize your updating jobs.

Stay safe, everyone!

The post Update now! Firefox and Adobe updates are more critical than Microsoft’s appeared first on Malwarebytes Labs.