Security Leftovers (UPDATED)
-
Security updates for Thursday [LWN.net]
Security updates have been issued by Debian (nova, pcs, and rails), Fedora (firejail, moby-engine, and pspp), Oracle (.NET 6.0, gnupg2, kernel, python3, and rsyslog rsyslog7), Red Hat (.NET 6.0 and .NET Core 3.1), SUSE (kernel), and Ubuntu (intel-microcode, poppler, and webkit2gtk).
-
Token-Mining Weakness in Microsoft Teams Makes for Perfect Phish
-
IOActive NFC Relay Attack - Tesla Y
Radio relay attacks are technically complicated to execute, but conceptually easy to understand: attackers simply extend the range of your existing key using what is essentially a high-tech walkie-talkie. One thief stands near you while you’re in the grocery store, intercepting your key’s transmitted signal with a radio transceiver. Another stands near your car, with another transceiver, taking the signal from their friend and passing it on to the car. Since the car and the key can now talk, through the thieves’ range extenders, the car has no reason to suspect the key isn’t inside—and fires right up.
But Tesla’s credit card keys, like many digital keys stored in cell phones, don’t work via radio. Instead, they rely on a different protocol called Near Field Communication or NFC. Those keys had previously been seen as more secure, since their range is so limited and their handshakes with cars are more complex.
Now, researchers seem to have cracked the code. By reverse-engineering the communications between a Tesla Model Y and its credit card key, they were able to properly execute a range-extending relay attack against the crossover. While this specific use case focuses on Tesla, it’s a proof of concept—NFC handshakes can, and eventually will, be reverse-engineered.
-
When It Comes to Security, Don’t Overlook Your Linux Systems [Ed: At least it does not have known back doors and patching is rapid]
As I pointed out earlier this year, Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them. Linux-based attacks are very much still happening.
-
CISA Releases Eleven Industrial Control Systems Advisories [Ed: This title is so generic you'd struggle to guess it's all about Siemens]
CISA has released eleven (11) Industrial Control Systems (ICS) advisories on September 15, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
UPDATE
A couple more.
-
Siemens Mobility CoreShield OWG Software | CISA
Successful exploitation of this vulnerability could allow an attacker to leverage the default installation for Windows versions of the CoreShield (OWG) software, which sets insecure file permissions that could result in local escalation of privileges to local administrator.
-
Linux variant of the SideWalk backdoor discovered [Ed: It's not a "backdoor"; it's malware. You need to actually install malware. With Windows, on the other hand, the back doors are always there. Microsoft works with the NSA.]
ESET researchers have discovered a Linux variant of the SideWalk backdoor, one of the multiple custom implants used by the SparklingGoblin APT group.