header image

Cyber Intelligence Briefing: 7 May 2021

Billy Gouveia, Kyle Schwaeble 7 May 2021
7 May 2021    Billy Gouveia, Kyle Schwaeble

CHALLENGING INSECURITY: A ROADMAP TO CYBER CONFIDENCE

In our latest report, we demystify the drivers of insecurity among cyber security professionals, in so doing, mapping a path to cyber confidence.

Download Report

The S-RM Cyber Intelligence Briefing is a weekly round-up of the latest cyber security news, trends and indicators, curated by our intelligence specialists.


Vulnerabilities in Cisco and VMware products. Patches available.

 SO WHAT?  Patch management is an integral part of a mature cyber security posture and organisations need to ensure they are patching software and hardware as soon as reasonably possible.


Drones open doors for Tesla on the fly

 

  • Researchers discovered vulnerabilities in an embedded device used in Tesla cars. The vulnerable component is not exclusive to Tesla so similar attacks could potentially be launched against other smart cars.
  • The researchers were able to exploit the vulnerabilities by using drones, up to 100 meters away from the car. Using Wi-Fi, they gained access to the car’s infotainment system, allowing them to control various functions, including doors, music, and air conditioning.

 SO WHAT?  Companies are reminded that IoT devices are notoriously insecure and their use drastically increases a company’s attack surface and exposure to risk. Tesla have patched the vulnerabilities.


Not so fast: DDoS attack targets ISP for Belgian government services

  • On Tuesday, a targeted distributed denial of service (DDoS) attack took down the Belgian government’s websites and internal IT networks. The service outage also impacted parliament, as well as university and research organisations.
  • The perpetrators altered their attack techniques throughout the incident. This made it more difficult to neutralise the attack, thus exacerbating the duration and disruptiveness of the outage.

 SO WHAT?  DDoS attacks continue to remain an effective attack method, with attacker tactics evolving to make attacks more damaging. Successful attacks can bring down public and private infrastructure alike.


Vulnerabilities in Dell driver affecting hundreds of millions of devices

  • A driver for various Dell computing devices contains multiple vulnerabilities. The five flaws, tracked collectively as CVE-2021-21551, are believed to affect hundreds of millions of Dell devices.
  • The affected driver has been pushed to Dell devices for the last 12 years. The vulnerability can be exploited to escalate privileges and allow an attacker to gain persistence on an already compromised system. 

 SO WHAT?  While there are no indications that CVE-2021-21551 is being actively exploited in the wild, this is likely to change, and it is vital that organisations and individuals alike apply the relevant patch as soon as possible.


So-phish-sticated campaign targeted organisations globally 

  • A phishing campaign that delivered malware to organisations worldwide in December 2020 was recently disclosed. At least 50 organisations from various industries were targeted by the sophisticated campaign, which was likely backed by considerable resources.
  • New malware strains were deployed by the threat group, whose identity is yet to be determined. Obfuscated and file-less malware was used to evade detection and the phishing emails were highly tailored.

 SO WHAT?  As the sophistication of phishing campaigns increase, it is imperative that organisations tailor simulated phishing attacks to match the maturity of their security awareness programmes.


Not Always the Silver Bullet: Malicious Office 365 apps used to bypass MFA

  • A global phishing campaign is using fake Office 365 apps to bypass MFA. The phishing email takes a user to their legitimate email login page; however, after logging in the user is prompted to install a malicious application, which grants persistent, password-free, access to an attacker.
  • Because the app is approved by the user after logging in, it can bypass MFA. The app will remain in the user’s Office 365 account until removed and even survives account password resets.

 SO WHAT?  MFA remains an effective and important security control but needs to be properly configured. Furthermore, organisations should utilise multiple controls to achieve defence in depth.


Apple zero-day vulnerabilities, updates available now. 

  • Newly discovered exploits in the browser engine for iOS devices allow for remote code execution. CVE-2021-30665 and CVE-2021-30663 expose vulnerable devices if they simply visit a malicious website. Apple Watch, macOS Big Sur, iPad and iPhone are all vulnerable.
  • Updates released on 3 May provide fixes. Apple users should not hesitate to update iPads, iPhones, laptops and desktops, and watches.

 SO WHAT?  Recently, Apple has seen an uptick in actively exploited zero-day vulnerabilities. Apple users must be just as effective in monitoring and installing updates as Windows users.

 

Cyber Threat Intelligence Briefing

To discuss this article or other industry developments, please reach out to one of our experts.

Billy Gouveia
Billy gouveia Senior Managing Director Email Billy
Kyle Schwaeble
Kyle schwaeble Analyst Email Kyle

CYBER INCIDENT RESPONSE: PERSPECTIVES FROM INSIDE THE RISK ECOSYSTEM

In our latest report, we examine a cyber incident from the perspective of several key stakeholders.

Download Report